diff --git a/i18n/ar/about/donation-acceptance-policy.md b/i18n/ar/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/ar/about/donation-acceptance-policy.md +++ b/i18n/ar/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/ar/about/jobs.md b/i18n/ar/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/ar/about/jobs.md +++ b/i18n/ar/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/ar/advanced/communication-network-types.md b/i18n/ar/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/ar/advanced/communication-network-types.md +++ b/i18n/ar/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/ar/advanced/tor-overview.md b/i18n/ar/advanced/tor-overview.md index 82925019..2187a32b 100644 --- a/i18n/ar/advanced/tor-overview.md +++ b/i18n/ar/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/ar/ai-chat.md b/i18n/ar/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/ar/ai-chat.md +++ b/i18n/ar/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/ar/alternative-networks.md b/i18n/ar/alternative-networks.md index 0504f0af..cb5dfa61 100644 --- a/i18n/ar/alternative-networks.md +++ b/i18n/ar/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ar/android/general-apps.md b/i18n/ar/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/ar/android/general-apps.md +++ b/i18n/ar/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/ar/basics/vpn-overview.md b/i18n/ar/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/ar/basics/vpn-overview.md +++ b/i18n/ar/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/ar/basics/why-privacy-matters.md +++ b/i18n/ar/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md index 7c19287a..1504867a 100644 --- a/i18n/ar/desktop-browsers.md +++ b/i18n/ar/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 64592e48..50675a81 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" } @@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" } @@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" } @@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/ar/dns.md b/i18n/ar/dns.md index 7d88fc2a..91cb77f1 100644 --- a/i18n/ar/dns.md +++ b/i18n/ar/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ar/document-collaboration.md b/i18n/ar/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/ar/document-collaboration.md +++ b/i18n/ar/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/ar/health-and-wellness.md b/i18n/ar/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/ar/health-and-wellness.md +++ b/i18n/ar/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/ar/index.md b/i18n/ar/index.md index 17afb0cb..94061d93 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/ar/language-tools.md b/i18n/ar/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/ar/language-tools.md +++ b/i18n/ar/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/ar/maps.md b/i18n/ar/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/ar/maps.md +++ b/i18n/ar/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/ar/meta/admonitions.md b/i18n/ar/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/ar/meta/admonitions.md +++ b/i18n/ar/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/ar/news-aggregators.md b/i18n/ar/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/ar/news-aggregators.md +++ b/i18n/ar/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/ar/office-suites.md b/i18n/ar/office-suites.md index 43ba82c5..63e3e6c3 100644 --- a/i18n/ar/office-suites.md +++ b/i18n/ar/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/ar/os/windows/group-policies.md b/i18n/ar/os/windows/group-policies.md index d1a033cb..b0987d0b 100644 --- a/i18n/ar/os/windows/group-policies.md +++ b/i18n/ar/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/ar/pastebins.md b/i18n/ar/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/ar/pastebins.md +++ b/i18n/ar/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ar/photo-management.md b/i18n/ar/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/ar/photo-management.md +++ b/i18n/ar/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ar/privacy.md b/i18n/ar/privacy.md index c536393e..ffe9f464 100644 --- a/i18n/ar/privacy.md +++ b/i18n/ar/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index dcc05015..5f17e18f 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index 49ecfcfa..34b4bf10 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Tor Browser logo](assets/img/browsers/tor.svg){ align=left } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**متصفِّح تور** خير خيار إن أردت المجهولية، فهو يمكِّنك من الاتصال بشبكة تور وجسورها، وفيه إعدادات مبدئية تُضبط حسب مستوى الأمن: *قياسي* و*أأمن* و*أشدُّ أمن*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ If more complete anonymity is paramount to your situation, you should **only** b
-صمِّم متصفِّح تور لمكافحة التبصيم، أو كشف هويَّتك حسب ضبط متصفِّحك. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +صمِّم متصفِّح تور لمكافحة التبصيم، أو كشف هويَّتك حسب ضبط متصفِّحك. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index 2bdb3875..af5c9b96 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/bn-IN/about/donation-acceptance-policy.md b/i18n/bn-IN/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/bn-IN/about/donation-acceptance-policy.md +++ b/i18n/bn-IN/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/bn-IN/advanced/communication-network-types.md b/i18n/bn-IN/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/bn-IN/advanced/communication-network-types.md +++ b/i18n/bn-IN/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/bn-IN/advanced/tor-overview.md b/i18n/bn-IN/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/bn-IN/advanced/tor-overview.md +++ b/i18n/bn-IN/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/bn-IN/ai-chat.md b/i18n/bn-IN/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/bn-IN/ai-chat.md +++ b/i18n/bn-IN/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/bn-IN/alternative-networks.md b/i18n/bn-IN/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/bn-IN/alternative-networks.md +++ b/i18n/bn-IN/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/bn-IN/android/general-apps.md b/i18n/bn-IN/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/bn-IN/android/general-apps.md +++ b/i18n/bn-IN/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/bn-IN/basics/vpn-overview.md b/i18n/bn-IN/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/bn-IN/basics/vpn-overview.md +++ b/i18n/bn-IN/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/bn-IN/basics/why-privacy-matters.md b/i18n/bn-IN/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/bn-IN/basics/why-privacy-matters.md +++ b/i18n/bn-IN/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/bn-IN/data-redaction.md b/i18n/bn-IN/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/bn-IN/data-redaction.md +++ b/i18n/bn-IN/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/bn-IN/desktop-browsers.md b/i18n/bn-IN/desktop-browsers.md index a8507937..0f57cad7 100644 --- a/i18n/bn-IN/desktop-browsers.md +++ b/i18n/bn-IN/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/bn-IN/desktop.md b/i18n/bn-IN/desktop.md index 64592e48..50675a81 100644 --- a/i18n/bn-IN/desktop.md +++ b/i18n/bn-IN/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/bn-IN/dns.md b/i18n/bn-IN/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/bn-IN/dns.md +++ b/i18n/bn-IN/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/bn-IN/document-collaboration.md b/i18n/bn-IN/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/bn-IN/document-collaboration.md +++ b/i18n/bn-IN/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/bn-IN/encryption.md b/i18n/bn-IN/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/bn-IN/encryption.md +++ b/i18n/bn-IN/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/bn-IN/health-and-wellness.md b/i18n/bn-IN/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/bn-IN/health-and-wellness.md +++ b/i18n/bn-IN/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/bn-IN/index.md b/i18n/bn-IN/index.md index b181fecd..f200d7ef 100644 --- a/i18n/bn-IN/index.md +++ b/i18n/bn-IN/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/bn-IN/language-tools.md b/i18n/bn-IN/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/bn-IN/language-tools.md +++ b/i18n/bn-IN/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/bn-IN/maps.md b/i18n/bn-IN/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/bn-IN/maps.md +++ b/i18n/bn-IN/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/bn-IN/meta/admonitions.md b/i18n/bn-IN/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/bn-IN/meta/admonitions.md +++ b/i18n/bn-IN/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/bn-IN/news-aggregators.md b/i18n/bn-IN/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/bn-IN/news-aggregators.md +++ b/i18n/bn-IN/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/bn-IN/notebooks.md b/i18n/bn-IN/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/bn-IN/notebooks.md +++ b/i18n/bn-IN/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/bn-IN/passwords.md b/i18n/bn-IN/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/bn-IN/passwords.md +++ b/i18n/bn-IN/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/bn-IN/pastebins.md b/i18n/bn-IN/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/bn-IN/pastebins.md +++ b/i18n/bn-IN/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/bn-IN/photo-management.md b/i18n/bn-IN/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/bn-IN/photo-management.md +++ b/i18n/bn-IN/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/bn-IN/privacy.md b/i18n/bn-IN/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/bn-IN/privacy.md +++ b/i18n/bn-IN/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/bn-IN/real-time-communication.md b/i18n/bn-IN/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/bn-IN/real-time-communication.md +++ b/i18n/bn-IN/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index 3f04e880..9aacfdff 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/bn-IN/tor.md b/i18n/bn-IN/tor.md index 39e10a8e..dfe335cf 100644 --- a/i18n/bn-IN/tor.md +++ b/i18n/bn-IN/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/bn-IN/vpn.md b/i18n/bn-IN/vpn.md index 779931a8..4d8c2581 100644 --- a/i18n/bn-IN/vpn.md +++ b/i18n/bn-IN/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/bn/about/donation-acceptance-policy.md b/i18n/bn/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/bn/about/donation-acceptance-policy.md +++ b/i18n/bn/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/bn/advanced/communication-network-types.md b/i18n/bn/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/bn/advanced/communication-network-types.md +++ b/i18n/bn/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/bn/advanced/tor-overview.md b/i18n/bn/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/bn/advanced/tor-overview.md +++ b/i18n/bn/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/bn/ai-chat.md b/i18n/bn/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/bn/ai-chat.md +++ b/i18n/bn/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/bn/alternative-networks.md b/i18n/bn/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/bn/alternative-networks.md +++ b/i18n/bn/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/bn/android/general-apps.md b/i18n/bn/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/bn/android/general-apps.md +++ b/i18n/bn/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/bn/basics/vpn-overview.md b/i18n/bn/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/bn/basics/vpn-overview.md +++ b/i18n/bn/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/bn/basics/why-privacy-matters.md +++ b/i18n/bn/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md index a8507937..0f57cad7 100644 --- a/i18n/bn/desktop-browsers.md +++ b/i18n/bn/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 64592e48..50675a81 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/bn/dns.md b/i18n/bn/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/bn/dns.md +++ b/i18n/bn/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/bn/document-collaboration.md b/i18n/bn/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/bn/document-collaboration.md +++ b/i18n/bn/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/bn/health-and-wellness.md b/i18n/bn/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/bn/health-and-wellness.md +++ b/i18n/bn/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/bn/index.md b/i18n/bn/index.md index b181fecd..f200d7ef 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/bn/language-tools.md b/i18n/bn/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/bn/language-tools.md +++ b/i18n/bn/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/bn/maps.md b/i18n/bn/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/bn/maps.md +++ b/i18n/bn/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/bn/meta/admonitions.md b/i18n/bn/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/bn/meta/admonitions.md +++ b/i18n/bn/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/bn/news-aggregators.md b/i18n/bn/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/bn/news-aggregators.md +++ b/i18n/bn/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/bn/pastebins.md b/i18n/bn/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/bn/pastebins.md +++ b/i18n/bn/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/bn/photo-management.md b/i18n/bn/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/bn/photo-management.md +++ b/i18n/bn/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/bn/privacy.md b/i18n/bn/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/bn/privacy.md +++ b/i18n/bn/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index 3f04e880..9aacfdff 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index 0bc69cfa..13d1c2bb 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index 779931a8..4d8c2581 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/cs/about/donation-acceptance-policy.md b/i18n/cs/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/cs/about/donation-acceptance-policy.md +++ b/i18n/cs/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/cs/advanced/communication-network-types.md b/i18n/cs/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/cs/advanced/communication-network-types.md +++ b/i18n/cs/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/cs/advanced/tor-overview.md b/i18n/cs/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/cs/advanced/tor-overview.md +++ b/i18n/cs/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/cs/ai-chat.md b/i18n/cs/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/cs/ai-chat.md +++ b/i18n/cs/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/cs/alternative-networks.md b/i18n/cs/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/cs/alternative-networks.md +++ b/i18n/cs/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/cs/android/general-apps.md b/i18n/cs/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/cs/android/general-apps.md +++ b/i18n/cs/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/cs/basics/vpn-overview.md b/i18n/cs/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/cs/basics/vpn-overview.md +++ b/i18n/cs/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md index 97a9a650..204bbe19 100644 --- a/i18n/cs/basics/why-privacy-matters.md +++ b/i18n/cs/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md index 0be0c760..9bb087b9 100644 --- a/i18n/cs/desktop-browsers.md +++ b/i18n/cs/desktop-browsers.md @@ -91,7 +91,7 @@ Pokud potřebujete procházet internet anonymně, měli byste místo toho použ Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 64592e48..50675a81 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index a9eb4493..20697506 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/cs/document-collaboration.md b/i18n/cs/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/cs/document-collaboration.md +++ b/i18n/cs/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/cs/health-and-wellness.md b/i18n/cs/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/cs/health-and-wellness.md +++ b/i18n/cs/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/cs/index.md b/i18n/cs/index.md index afc43fe8..42529a50 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/cs/language-tools.md b/i18n/cs/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/cs/language-tools.md +++ b/i18n/cs/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/cs/maps.md b/i18n/cs/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/cs/maps.md +++ b/i18n/cs/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/cs/meta/admonitions.md b/i18n/cs/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/cs/meta/admonitions.md +++ b/i18n/cs/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/cs/news-aggregators.md b/i18n/cs/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/cs/news-aggregators.md +++ b/i18n/cs/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/cs/pastebins.md b/i18n/cs/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/cs/pastebins.md +++ b/i18n/cs/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/cs/photo-management.md b/i18n/cs/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/cs/photo-management.md +++ b/i18n/cs/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/cs/privacy.md b/i18n/cs/privacy.md index 16bb763c..293705fd 100644 --- a/i18n/cs/privacy.md +++ b/i18n/cs/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index 3f04e880..9aacfdff 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 39e10a8e..dfe335cf 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index 779931a8..4d8c2581 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/de/about/donation-acceptance-policy.md b/i18n/de/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/de/about/donation-acceptance-policy.md +++ b/i18n/de/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/de/advanced/communication-network-types.md b/i18n/de/advanced/communication-network-types.md index bda0cc4c..a0c46ec0 100644 --- a/i18n/de/advanced/communication-network-types.md +++ b/i18n/de/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Eine Übersicht über mehrere Netzwerkarchitekturen, die häufig vo Es gibt mehrere Netzwerkarchitekturen, die häufig verwendet werden, um Nachrichten zwischen Menschen zu übertragen. Diese Netzwerke können unterschiedliche Datenschutzgarantien bieten, weshalb es sich lohnt, bei der Entscheidung, welche App du verwenden möchtest, ihr [Bedrohungsmodell](../basics/threat-modeling.md) zu berücksichtigen. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Zentralisierte Netzwerke diff --git a/i18n/de/advanced/tor-overview.md b/i18n/de/advanced/tor-overview.md index c52f5edb..e964fbb1 100644 --- a/i18n/de/advanced/tor-overview.md +++ b/i18n/de/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt [**Tor**](../alternative-networks.md#tor) ist ein kostenloses, dezentralisiertes Netzwerk, das entwickelt wurde, um das Internet mit so viel Privatsphäre wie möglich zu nutzen. Bei richtiger Nutzung ermöglicht das Netzwerk privates und anonymes Surfen und Kommunikation. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor funktioniert, indem es deinen Internetverkehr über von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Da wir bereits [allgemein empfehlen](../basics/vpn-overview.md), dass die überw Wenn du dich direkt mit Tor verbindest, wird deine Verbindung den Administratoren des lokalen Netzwerks oder deinem ISP auffallen. Das Erkennen und Korrelieren dieses Datenverkehrs wurde in der Vergangenheit von Netzwerkadministratoren [durchgeführt](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax), um bestimmte Tor-Nutzer in ihrem Netzwerk zu identifizieren und zu deanonymisieren. Andererseits ist eine Verbindung zu einem VPN fast immer weniger verdächtig, da kommerzielle VPN-Anbieter von normalen Verbrauchern für eine Vielzahl von alltäglichen Aufgaben wie die Umgehung von Geobeschränkungen genutzt werden, selbst in Ländern mit starken Internetbeschränkungen. -Daher solltest du dich bemühen, deine IP-Adresse zu verbergen, ** bevor du** dich mit dem Tor-Netzwerk verbindest. Du kannst dies tun, indem du dich einfach mit einem VPN verbindest (über einen auf deinem Computer installierten Client) und dann ganz normal auf [Tor](../tor.md) zugreifst, zum Beispiel über den Tor Browser. Dadurch entsteht eine Verbindungskette wie: +Daher solltest du dich bemühen, deine IP-Adresse zu verbergen, ** bevor du** dich mit dem Tor-Netzwerk verbindest. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] Du → VPN → Tor → Internet Aus der Sicht deines Internetanbieters sieht es so aus, als würdest du ganz normal auf ein VPN zugreifen (mit dem damit verbundenen Schutz, der dir gewährt wird). Aus der Sicht deines VPNs können sie sehen, dass du dich mit dem Tor-Netzwerk verbindest, aber nicht, auf welche Webseiten du zugreifst. Aus der Sicht von Tor verbindest du dich ganz normal, aber im unwahrscheinlichen Fall, dass das Tor-Netzwerk kompromittiert wird, würde nur die IP deines VPNs aufgedeckt und dein VPN müsste *zusätzlich* kompromittiert werden, um dich zu deanonymisieren. -Dies ist **kein** Ratschlag zur Umgehung der Zensur, denn wenn Tor komplett von deinem ISP blockiert wird, wird es dein VPN wahrscheinlich auch. Vielmehr zielt diese Empfehlung darauf ab, deinen Datenverkehr besser mit dem gewöhnlichen Datenverkehr von VPN-Nutzern zu vermischen und dir ein gewisses Maß an plausibler Abstreitbarkeit zu geben, indem du die Tatsache verschleierst, dass du dich von deinem ISP aus mit Tor verbindest. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Vielmehr zielt diese Empfehlung darauf ab, deinen Datenverkehr besser mit dem gewöhnlichen Datenverkehr von VPN-Nutzern zu vermischen und dir ein gewisses Maß an plausibler Abstreitbarkeit zu geben, indem du die Tatsache verschleierst, dass du dich von deinem ISP aus mit Tor verbindest. --- @@ -51,7 +51,7 @@ Wir **raten dringend davon ab,** Tor mit einem VPN auf irgendeine andere Weise z - Du → VPN → Tor → VPN → Internet - Jede andere Konfiguration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/de/ai-chat.md b/i18n/de/ai-chat.md index bba40b3d..b09cbcbd 100644 --- a/i18n/de/ai-chat.md +++ b/i18n/de/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/de/alternative-networks.md b/i18n/de/alternative-networks.md index 2beb7c79..fc20dee0 100644 --- a/i18n/de/alternative-networks.md +++ b/i18n/de/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/de/android/general-apps.md b/i18n/de/android/general-apps.md index 2dca3a24..af3ba4a4 100644 --- a/i18n/de/android/general-apps.md +++ b/i18n/de/android/general-apps.md @@ -70,10 +70,10 @@ Shelter wird gegenüber [Insular](https://secure-system.gitlab.io/Insular) und [ **Secure Camera** ist eine Kamera-App, die sich auf Datenschutz und Sicherheit konzentriert und Bilder, Videos und QR-Codes aufnehmen kann. CameraX Herstellererweiterungen (Porträt, HDR, Nachtsicht, Gesichtsretusche und Auto) sind auf unterstützten Geräten ebenfalls verfügbar. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } -[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Spenden } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
Downloads @@ -116,9 +116,9 @@ Die Metadaten zur Bildausrichtung werden nicht gelöscht. Wenn du den Standort ( [Content-Security-Policy](https://de.wikipedia.org/wiki/Content_Security_Policy) wird verwendet, um zu erzwingen, dass die JavaScript- und Styling-Eigenschaften innerhalb der WebView ausschließlich statische Inhalte sind. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Spenden } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
Downloads diff --git a/i18n/de/basics/vpn-overview.md b/i18n/de/basics/vpn-overview.md index 8b0e5c40..ff52532b 100644 --- a/i18n/de/basics/vpn-overview.md +++ b/i18n/de/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md index b031f472..d6040a64 100644 --- a/i18n/de/basics/why-privacy-matters.md +++ b/i18n/de/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Die Privatsphäre geht letztendlich um menschliche Informationen, und das ist wi Viele Menschen verwechseln die Begriffe zur **Privatsphäre**, **Sicherheit** und **Anonymität**. Es gibt Leute, die verschiedene Produkte als "nicht privat" kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privatsphäre** @@ -58,7 +58,7 @@ Nimm zum Beispiel Einwilligungserklärungen für Cookies. Auf den verschiedenen Datenschutz ist etwas, das standardmäßig in die von uns genutzte [Software und die von uns genutzten Dienste](../tools.md) implementiert sein muss, denn man kann die meisten Anwendungen und Dienste nicht selbst auf Datenschutz trimmen. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Quellen diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index 5ebdd432..310da685 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Angriffe](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Diensteanbieter](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Mindestanforderungen -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt in dieser Kategorie wünschen würden. Unsere Empfehlungen enthalten möglicherweise keine oder nicht alle dieser Merkmale, aber diejenigen, die sie enthalten, werden möglicherweise höher eingestuft als andere auf dieser Seite. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 2ed3d6b4..652d0c30 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index b2f1d8a9..e9e0af90 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -91,7 +91,7 @@ Wenn du anonym im Internet surfen möchtest, solltest du stattdessen [Tor](tor.m Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Wenn du deinen Browser stärker konfigurieren möchtest und Fingerprinting für dich kein Thema ist, empfehlen wir stattdessen [Firefox](#firefox). diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index ff7ab660..9333ed74 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/de/dns.md b/i18n/de/dns.md index da358913..7637b1af 100644 --- a/i18n/de/dns.md +++ b/i18n/de/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Verschlüsselte DNS-Proxy-Software stellt einen lokalen Proxy für den [unversch [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/de/document-collaboration.md b/i18n/de/document-collaboration.md index 8dbc1ceb..a497ed30 100644 --- a/i18n/de/document-collaboration.md +++ b/i18n/de/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Lese unsere neuste CryptPad Rezension.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index 54433a00..debef44c 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -65,9 +65,9 @@ In der Dokumentation von Cryptomator werden die angestrebten [Sicherheitsziele]( **Picocrypt** ist ein kleines und simples Verschlüsselungstool, das moderne Verschlüsselung bietet. Picocrypt verwendet die sichere XChaCha20-Chiffre und die Argon2id-Schlüsselableitungsfunktion, um ein hohes Maß an Sicherheit zu gewährleisten. Es verwendet Go's Standard x/crypto Module für seine Verschlüsselungsfunktionen. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Spenden" } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
Downloads @@ -207,9 +207,9 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** ist die Standard-FDE-Methode für Linux. Es kann zur Verschlüsselung ganzer Volumes, Partitionen oder zur Erstellung verschlüsselter Container verwendet werden. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Dokumentation" } -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Quellcode" } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
diff --git a/i18n/de/health-and-wellness.md b/i18n/de/health-and-wellness.md index c14c73b2..40e43edf 100644 --- a/i18n/de/health-and-wellness.md +++ b/i18n/de/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/de/index.md b/i18n/de/index.md index 255dd877..c7b6f35d 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -114,6 +114,6 @@ Im modernen Zeitalter der digitalen Datenausbeutung ist deine Privatsphäre noch Viele Menschen verwechseln die Begriffe Privatsphäre, Sicherheit und Anonymität. Es gibt Leute, die verschiedene Produkte als „nicht privat“ kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/de/language-tools.md b/i18n/de/language-tools.md index 6d0698e9..07569ed4 100644 --- a/i18n/de/language-tools.md +++ b/i18n/de/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Diensteanbieter](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übersetzungsdienste eingegeben werden, können vertrauliche Informationen enthalten, die auf deren Servern auf unbestimmte Zeit gespeichert und an Dritte verkauft werden können. Die auf dieser Seite aufgeführten Sprachtools speichern den von dir übermittelten Text nicht auf einem Server und können selbst gehostet und offline verwendet werden, um eine maximale Kontrolle über deine Daten zu gewährleisten. +Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übersetzungsdienste eingegeben werden, können vertrauliche Informationen enthalten, die auf deren Servern auf unbestimmte Zeit gespeichert und an Dritte verkauft werden können. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -22,9 +22,9 @@ Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übe **LanguageTool** ist eine mehrsprachige Grammatik-, Stil- und Rechtschreibprüfung, die mehr als 20 Sprachen unterstützt. Laut ihrer Datenschutzrichtlinie speichern sie keine Inhalte, die zur Überprüfung an ihren Dienst gesendet werden, aber für eine höhere Sicherheit ist die Software [selbst-hostbar](https://dev.languagetool.org/http-server). [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Quellcode" } +[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
Downloads @@ -33,7 +33,7 @@ Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übe - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/de/maps.md b/i18n/de/maps.md index 8606e763..0eced992 100644 --- a/i18n/de/maps.md +++ b/i18n/de/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/de/meta/admonitions.md b/i18n/de/meta/admonitions.md index 69dbd7c6..0fb3f1c3 100644 --- a/i18n/de/meta/admonitions.md +++ b/i18n/de/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitionen** (oder "Call-outs") sind eine Möglichkeit für Autoren, Nebeninhalte in einen Artikel einzufügen, ohne den Dokumentfluss zu unterbrechen. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Altes Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/de/news-aggregators.md b/i18n/de/news-aggregators.md index 22f79c29..7d8f1555 100644 --- a/i18n/de/news-aggregators.md +++ b/i18n/de/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index ba27fb69..6f5fe2d8 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-basiert @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index 032858cd..26866b44 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -128,14 +128,14 @@ schema: **Passwort-Manager** ermöglichen die sichere Speicherung und Verwaltung von Passwörtern und anderen Anmeldeinformationen unter Verwendung eines Master-Passworts. -[Einführung in Passwörter :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Einführung in Passwörter :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Integrierte Passwortmanager in Software wie Browsern und Betriebssystemen sind manchmal nicht so gut wie spezielle Passwortmanager-Software. Der Vorteil eines integrierten Passwortmanagers ist die gute Integration in die Software, aber er ist oft sehr einfach und verfügt nicht über die Datenschutz- und Sicherheitsfunktionen, die eigenständige Angebote bieten. -Der Passwort-Manager in Microsoft Edge bietet zum Beispiel überhaupt kein E2EE. Googles Passwortmanager hat [optional](https://support.google.com/accounts/answer/11350823) E2EE, und [Apples](https://support.apple.com/HT202303) bietet standardmäßig E2EE. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Googles Passwortmanager hat [optional](https://support.google.com/accounts/answer/11350823) E2EE, und [Apples](https://support.apple.com/HT202303) bietet standardmäßig E2EE.
@@ -163,19 +163,19 @@ Diese Passwort-Manager synchronisieren deine Passwörter mit einem Cloud-Server, - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) -- [:simple-apple: macOS](https://bitwarden.com/de-de/download/) -- [:simple-linux: Linux](https://bitwarden.com/de-de/download/) +- [:simple-apple: macOS](https://bitwarden.com/download) +- [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/de/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden verwendet standardmäßig [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) als Schlüsselableitungsalgorithmus (KDF). Als Alternative bietet es auch das sicherere [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id) an. Du kannst den KDF-Algorithmus deines Kontos im Web-Tresor ändern. +Bitwarden verwendet standardmäßig [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) als Schlüsselableitungsalgorithmus (KDF). Als Alternative bietet es auch das sicherere [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id) an. You can change your account's KDF algorithm in the web vault: - [x] Wähle **Einstellungen > Sicherheit > Schlüssel > KDF-Algorithmus > Argon2id** @@ -204,11 +204,11 @@ Der serverseitige Code von Bitwarden ist [quelloffen](https://github.com/bitward Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ Alle Probleme wurden kurz nach dem [Bericht](https://res.cloudinary.com/dbulfrlr ![1Password Logo](assets/img/password-management/1password.svg){ align=right } -**1Password** ist ein Passwortmanager mit einem starken Fokus auf Sicherheit und Benutzerfreundlichkeit, der es dir ermöglicht, Passwörter, Schlüssel, Kreditkarten, Softwarelizenzen und andere sensible Informationen in einem sicheren digitalen Tresor zu speichern. Dein Tresor wird auf den Servern von 1Password gegen eine [monatliche Gebühr] (https://1password.com/sign-up) gehostet. 1Password wird regelmäßig [geprüft] (https://support.1password.com/security-assessments) und bietet einen hervorragenden Kundensupport. 1Password ist ein Closed-Source-Produkt; die Sicherheit des Produkts ist jedoch in ihrem [Sicherheits-Whitepaper](https://1passwordstatic.com/files/security/1password-white-paper.pdf) ausführlich dokumentiert. +**1Password** ist ein Passwortmanager mit einem starken Fokus auf Sicherheit und Benutzerfreundlichkeit, der es dir ermöglicht, Passwörter, Schlüssel, Kreditkarten, Softwarelizenzen und andere sensible Informationen in einem sicheren digitalen Tresor zu speichern. Dein Tresor wird auf den Servern von 1Password gegen eine [monatliche Gebühr] (https://1password.com/sign-up) gehostet. + +1Password wird regelmäßig [geprüft] (https://support.1password.com/security-assessments) und bietet einen hervorragenden Kundensupport. 1Password ist ein Closed-Source-Produkt; die Sicherheit des Produkts ist jedoch in ihrem [Sicherheits-Whitepaper](https://1passwordstatic.com/files/security/1password-white-paper.pdf) ausführlich dokumentiert. [:octicons-home-16: Homepage](https://1password.com/de){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/de/legal/privacy){ .card-link title="Datenschutzerklärung" } @@ -244,16 +246,16 @@ Alle Probleme wurden kurz nach dem [Bericht](https://res.cloudinary.com/dbulfrlr - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionell bot 1Password das beste Benutzererlebnis von Passwort-Managern für Menschen, die macOS und iOS nutzen; jedoch hat es nun Funktionsparität auf allen Plattformen erreicht. Die Clients von 1Password verfügen über viele Funktionen, die sich an Familien und technisch weniger versierte Personen richten, wie z. B. eine intuitive Benutzeroberfläche für einfache Bedienung und Navigation sowie erweiterte Funktionen. Nahezu jede Funktion von 1Password ist in den nativen mobilen oder Desktop-Clients verfügbar. +Traditionell bot 1Password das beste Benutzererlebnis von Passwort-Managern für Menschen, die macOS und iOS nutzen; jedoch hat es nun Funktionsparität auf allen Plattformen erreicht. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Nahezu jede Funktion von 1Password ist in den nativen mobilen oder Desktop-Clients verfügbar. Dein 1Password-Tresor ist sowohl mit deinem Master-Passwort als auch mit einem zufälligen 34-Zeichen-Sicherheitsschlüssel zur Verschlüsselung deiner Daten auf den Servern von 1Password gesichert. Dieser Sicherheitsschlüssel bietet einen zusätzlichen Schutz für deine Daten, da deine Daten unabhängig von deinem Master-Kennwort mit hoher Entropie gesichert sind. Viele andere Passwortmanager-Lösungen verlassen sich bei der Sicherung deiner Daten ausschließlich auf die Stärke deines Master-Passworts. @@ -276,7 +278,7 @@ Dein 1Password-Tresor ist sowohl mit deinem Master-Passwort als auch mit einem z - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Mit diesen Optionen kannst du eine verschlüsselte Kennwortdatenbank lokal verwa - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,12 +348,12 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org ![KeePassDX Logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** ist ein leichtgewichtiger Passwort-Manager für Android. Er ermöglicht das Bearbeiten von verschlüsselten Daten in einer einzelnen Datei im KeePass-Format und kann Formulare sicher ausfüllen. Die [Pro-Version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) der App ermöglicht es dir, kosmetische Inhalte und nicht standardmäßige Protokollfunktionen freizuschalten, aber noch wichtiger ist, dass sie die Entwicklung unterstützt und fördert. +**KeePassDX** ist ein leichtgewichtiger Passwort-Manager für Android. Er ermöglicht das Bearbeiten von verschlüsselten Daten in einer einzelnen Datei im KeePass-Format und kann Formulare sicher ausfüllen. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Dokumentation" } -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Spenden" } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -363,6 +365,8 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org ### Kriterien -**Bitte beachte, dass wir mit keinem der Projekte, die wir empfehlen, in Verbindung stehen.** Zusätzlich zu unseren [Standardkriterien](about/criteria.md) haben wir eine Reihe klarer Anforderungen entwickelt, die es uns ermöglichen, objektive Empfehlungen zu geben. Wir empfehlen dir, dich mit der Liste vertraut zu machen, bevor du dich für ein Projekt entscheidest, und deine eigenen Recherchen anzustellen, um sicherzustellen, dass es die richtige Wahl für dich ist. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. - Muss plattformübergreifend sein. diff --git a/i18n/de/pastebins.md b/i18n/de/pastebins.md index 4c912a9d..07c93831 100644 --- a/i18n/de/pastebins.md +++ b/i18n/de/pastebins.md @@ -17,12 +17,12 @@ cover: pastebins.webp ![PrivateBin Logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** ist ein minimalistischer, quelloffener Online-Pastebin, bei dem der Server keine Kenntnis von den eingefügten Daten hat. Die Daten werden im Browser mit 256-Bit-AES verschlüsselt bzw. entschlüsselt. Es ist die verbesserte Version von ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Die Daten werden im Browser mit 256-Bit-AES verschlüsselt bzw. entschlüsselt. Es ist die verbesserte Version von ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Öffentliche Instanzen"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Quellcode" } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Mindestanforderungen - Muss Open Source sein. -- Muss eine "zero-trust" Ende-zu-Ende-Verschlüsselung implementieren. +- Must implement "zero-trust" E2EE. - Muss passwortgeschützte Dateien unterstützen. ### Im besten Fall Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt in dieser Kategorie wünschen würden. Unsere Empfehlungen enthalten möglicherweise keine oder nicht alle dieser Merkmale, aber diejenigen, die sie enthalten, werden möglicherweise höher eingestuft als andere auf dieser Seite. -- Sollte über ein veröffentlichtes Audit von einem angesehenen, unabhängigen Dritten verfügen. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/de/photo-management.md b/i18n/de/photo-management.md index 25b1a48e..9afa6c52 100644 --- a/i18n/de/photo-management.md +++ b/i18n/de/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Mindestanforderungen -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/de/privacy.md b/i18n/de/privacy.md index f4534ca0..10dccfda 100644 --- a/i18n/de/privacy.md +++ b/i18n/de/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 42a0f50c..4dfc19fb 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Verschlüsselte Messenger diff --git a/i18n/de/tools.md b/i18n/de/tools.md index 6fe1530b..c568b917 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/de/tor.md b/i18n/de/tor.md index c9864a75..2a06916a 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -31,7 +31,7 @@ schema: Das **Tor** Netzwerk besteht aus von Freiwilligen betriebenen Servern, die es kostenlos ermöglichen, die eigene Privatsphäre und Sicherheit im Internet zu verbessern. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. -[Detaillierte Tor-Übersicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tipp

@@ -42,7 +42,7 @@ Bevor du dich mit Tor verbindest, stelle bitte sicher, dass du unsere in unserer Es gibt eine Vielzahl von Möglichkeiten, sich von deinem Gerät aus mit dem Tor-Netzwerk zu verbinden. Die am häufigsten genutzte ist der **Tor Browser**, ein Fork (Abwandlung) von Firefox, der für [:material-incognito: anonymes](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} Surfen für Desktop-Computer und für Android entwickelt wurde. -Einige dieser Anwendungen sind besser als andere, und auch hier hängt die Entscheidung von deinem Bedrohungsmodell ab. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Wenn mehr Menschen regelmäßig Tor nutzen, hilft das, das schlechte Stigma von Tor zu verringern und senkt zudem die Qualität der "Listen von Tor-Nutzern", die ISPs und Regierungen erstellen können. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Wenn mehr Menschen regelmäßig Tor nutzen, hilft das, das schlechte Stigma von Tor zu verringern und senkt zudem die Qualität der "Listen von Tor-Nutzern", die ISPs und Regierungen erstellen können. Wenn du Wert auf vollständige Anonymität legst, solltest du **ausschließlich** den Tor-Browser-Client verwenden, idealerweise in einer Kombination aus [Whonix](desktop.md#whonix) und [Qubes](desktop.md#qubes-os). Mobile Browser sind bei Tor weniger verbreitet (und daher anfälliger für Fingerprinting). Außerdem sind diese Konfigurationen nicht so rigoros gegen Deanonymisierung getestet. @@ -50,15 +50,15 @@ Wenn du Wert auf vollständige Anonymität legst, solltest du **ausschließlich*
-![Tor-Browser-Logo](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** ist die richtige Wahl, wenn du Anonymität brauchst, denn er bietet dir Zugang zum Tor-Netzwerk und zu den Brücken. Er enthält Standardeinstellungen und Erweiterungen, die automatisch durch die Standard-Sicherheitsstufen konfiguriert werden: *Standard*, *Sicherer* und *Am Sichersten*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org/de/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/de/){ .card-link title=Benutzerhandbuch} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Quelltext" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Unterstützen} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Du solltest **niemals** zusätzliche Erweiterungen für den Tor-Browser installi
-Der Tor-Browser wurde entwickelt, um Fingerprinting zu verhindern, oder um dich anhand deiner Browserkonfiguration zu identifizieren. Daher ist es absolut notwendig, dass du den Browser in **keiner Weise**veränderst, abgesehen von der Anpassung der [Standard-Sicherheitsstufen](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Der Tor-Browser wurde entwickelt, um Fingerprinting zu verhindern, oder um dich anhand deiner Browserkonfiguration zu identifizieren. Daher ist es absolut notwendig, dass du den Browser in **keiner Weise**veränderst, abgesehen von der Anpassung der [Standard-Sicherheitsstufen](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Zusätzlich zur Installation des Tor-Browsers auf deinem Computer, gibt es auch Betriebssysteme, die speziell für die Verbindung mit dem Tor-Netzwerk entwickelt wurden, wie [Whonix](desktop.md#whonix) oder [Qubes OS](desktop.md#qubes-os), die noch mehr Sicherheit und Schutz bieten als alleine der Standard-Tor-Browser. @@ -90,13 +90,15 @@ Zusätzlich zur Installation des Tor-Browsers auf deinem Computer, gibt es auch ![Onion Browser Logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -Der **Onion Browser** ist ein Open-Source-Browser, mit dem du auf iOS-Geräten anonym über das Tor-Netzwerk im Internet surfen kannst. Er wird vom [Tor-Projekt](https://support.torproject.org/glossary/onion-browser) unterstützt. [:material-star-box: Lies unsere neuste Onion Browser Review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +Der **Onion Browser** ist ein Open-Source-Browser, mit dem du auf iOS-Geräten anonym über das Tor-Netzwerk im Internet surfen kannst. Er wird vom [Tor-Projekt](https://support.torproject.org/glossary/onion-browser) unterstützt. + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Datenschutzerklärung" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Spenden } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index 9e352e85..e87adfb5 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -145,8 +145,9 @@ Systemabstürze [können](https://protonvpn.com/support/macos-t2-chip-kill-switc Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/el/about/donation-acceptance-policy.md b/i18n/el/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/el/about/donation-acceptance-policy.md +++ b/i18n/el/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/el/about/jobs.md b/i18n/el/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/el/about/jobs.md +++ b/i18n/el/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/el/advanced/communication-network-types.md b/i18n/el/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/el/advanced/communication-network-types.md +++ b/i18n/el/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/el/advanced/tor-overview.md b/i18n/el/advanced/tor-overview.md index af7387f3..1d1078b2 100644 --- a/i18n/el/advanced/tor-overview.md +++ b/i18n/el/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/el/ai-chat.md b/i18n/el/ai-chat.md index 686c72fd..21cfaa89 100644 --- a/i18n/el/ai-chat.md +++ b/i18n/el/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/el/alternative-networks.md b/i18n/el/alternative-networks.md index afec0cd5..4086da75 100644 --- a/i18n/el/alternative-networks.md +++ b/i18n/el/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/el/android/general-apps.md b/i18n/el/android/general-apps.md index 7a7c69db..c095ad55 100644 --- a/i18n/el/android/general-apps.md +++ b/i18n/el/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/el/basics/vpn-overview.md b/i18n/el/basics/vpn-overview.md index 2a9c7909..a3e0dad2 100644 --- a/i18n/el/basics/vpn-overview.md +++ b/i18n/el/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md index 0a88a6f2..86deeb13 100644 --- a/i18n/el/basics/why-privacy-matters.md +++ b/i18n/el/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Πολλά άτομα συγχέουν τις έννοιες της **ιδιωτικότητας** (privacy), της **ασφάλειας** (security), και της **ανωνυμίας** (anonymity). Συγκεκριμένα στα Ελληνικά τώρα, η αγγλική λέξη "privacy" έχει συχνά μεταφραστεί ως απόρρητο, αν και το απόρρητο είναι ευρύτερη έννοια. Θα λέγαμε πως περικλείει τόσο την ιδιωτικότητα, όσο την ασφάλεια και την ανωνυμία. Ετυμολογικά σημαίνει "αυτό που δεν λέγεται ή ορίζεται." Αγγλικές λέξεις που της αντιστοιχούν πέραν του "privacy" είναι: "confidentiality", "secret", "unspeakable", "undefinable." Για την αποφυγή σύγχησης, συνεπώς, μεταφράζουμε το "privacy" ως ιδιωτικότητα σε όλες τις περιπτώσεις εκτός από αυτές όπου νοείται ευρήτερα. Αν θέλεις να αναπτύξεις σωστή κρίση για τα συστήματα που χρησιμοποιείς καθημερινά, είναι σημαντικότατο να αντιληφθείς πως και πότε το απόρρητο διαχωρίζεται σε ιδιωτικότητα, ασφάλεια, και ανωνυμία· και πότε η καθεμία από αυτές παίζει ρόλο. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Ιδιωτικότητα** @@ -58,7 +58,7 @@ description: Στη σύγχρονη εποχή της εκμετάλλευση Η ιδιωτικότητα (και το απόρρητο γενικότερα) οφείλει να βρίσκεται ενσωματωμένο στο [ λογισμικό και τις υπηρεσίες](../tools.md) που χρησιμοποιούμε εκ προεπιλογής, δεν μπορείς από μόνο σου να παραποιήσεις τις περισσότερες εφαρμογές ώστε να είναι ιδιωτικές. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Πηγές diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md index 46ca0a31..403902ee 100644 --- a/i18n/el/desktop-browsers.md +++ b/i18n/el/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Εάν θέλεις να ρυθμίσεις τον περιηγητή σου σε μεγαλύτερο βαθμό και η αποτύπωση δεν σε απασχολεί, τότε σου προτείνουμε το [Firefox](#firefox). diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 64592e48..50675a81 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/el/dns.md b/i18n/el/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/el/dns.md +++ b/i18n/el/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/el/document-collaboration.md b/i18n/el/document-collaboration.md index 089862eb..cb213d67 100644 --- a/i18n/el/document-collaboration.md +++ b/i18n/el/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index 8d2dca1b..1a11e7f5 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/el/health-and-wellness.md b/i18n/el/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/el/health-and-wellness.md +++ b/i18n/el/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/el/index.md b/i18n/el/index.md index 8a87cab2..7bee844c 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Θα ακούσεις, για παράδειγμα, άτομα να κριτικάρουν διάφορα προϊόντα ως «μη-ιδιωτικά» ενώ στην πραγματικότητα εννοούν πως αυτά δεν προσφέρουν ανωνυμία. Στον παρών ιστότοπο καλύπτουμε και τα τρία θέματα, μα είναι κρίσιμο, όπως προαναφέραμε, να θυμάσαι την εννοιολογική τους διαφορά όσο διαβάζεις τις συμβουλές μας. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/el/language-tools.md b/i18n/el/language-tools.md index b4de4ddb..4687bd24 100644 --- a/i18n/el/language-tools.md +++ b/i18n/el/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/el/maps.md b/i18n/el/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/el/maps.md +++ b/i18n/el/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/el/meta/admonitions.md b/i18n/el/meta/admonitions.md index fae96b7b..c5459574 100644 --- a/i18n/el/meta/admonitions.md +++ b/i18n/el/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Παράδειγμα Υλοποίησης

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -Ο `ΤΊΤΛΟΣ` πρέπει να καθοριστεί, αν δεν θέλετε συγκεκριμένο τίτλο μπορείτε να τον ορίσετε στο ίδιο κείμενο με τον `TYPE` (βλέπε παρακάτω) σε περίπτωση τίτλου, π.χ. `Note`. Το "ΚΕΙΜΕΝΟ" θα πρέπει να είναι μορφοποιημένο σε Markdown. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. Το "ΚΕΙΜΕΝΟ" θα πρέπει να είναι μορφοποιημένο σε Markdown. ### Κανονικοί τύποι @@ -166,11 +166,11 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,12 +189,12 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -Το **PhotoPrism** είναι μια self-hostable πλατφόρμα για τη διαχείριση φωτογραφιών. Υποστηρίζει συγχρονισμό και κοινή χρήση άλμπουμ, καθώς και μια ποικιλία άλλων [χαρακτηριστικών](https://photoprism.app/features). Δεν περιλαμβάνει E2EE, οπότε είναι καλύτερο να φιλοξενηθεί σε έναν διακομιστή που εμπιστεύεστε και είναι υπό τον έλεγχό σας. +Το **PhotoPrism** είναι μια self-hostable πλατφόρμα για τη διαχείριση φωτογραφιών. Υποστηρίζει συγχρονισμό και κοινή χρήση άλμπουμ, καθώς και μια ποικιλία άλλων [χαρακτηριστικών](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Αρχική σελίδα](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Πολιτική Απορρήτου" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Τεκμηρίωση} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Πηγαίος Κώδικας" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Λήψεις @@ -209,7 +209,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. #### `downloads` -Πρόκειται για έναν ειδικό τύπο πτυσσόμενης προειδοποίησης, που χρησιμοποιείται για τη δημιουργία της ενότητας συνδέσμων λήψης. Χρησιμοποιείται μόνο σε κάρτες συστάσεων, όπως φαίνεται στο παραπάνω παράδειγμα. +This is a special type of collapsible admonition which is used to generate sections containing download links. Χρησιμοποιείται μόνο σε κάρτες συστάσεων, όπως φαίνεται στο παραπάνω παράδειγμα. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. ## Παλιά Μορφοποιήση -Σε ολόκληρο τον ιστότοπο, μπορεί να δείτε κάποιες παραινέσεις διαμορφωμένες παρόμοια με αυτά τα παραδείγματα: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**Αυτή η μορφοποιήση δεν χρησιμοποιείται πλέον,** επειδή δεν είναι συμβατή με τις νεότερες εκδόσεις του λογισμικού μετάφρασης του Crowdin. Κατά την προσθήκη μιας νέας σελίδας στον ιστότοπο, θα πρέπει να χρησιμοποιείται μόνο η νεότερη μορφή που βασίζεται στην HTML. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -Δεν υπάρχει βιασύνη για τη μετατροπή των παραινέσεων με την παλιά μορφή στη νέα μορφή. Οι σελίδες που χρησιμοποιούν σήμερα αυτή τη μορφοποίηση θα πρέπει να συνεχίσουν να λειτουργούν, αλλά θα τις ενημερώσουμε ώστε να χρησιμοποιούν τη νεότερη μορφή που βασίζεται στην HTML, καθώς συνεχίζουμε να ενημερώνουμε τον ιστότοπο. +Δεν υπάρχει βιασύνη για τη μετατροπή των παραινέσεων με την παλιά μορφή στη νέα μορφή. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index 34231fee..a09aca0b 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -202,7 +202,7 @@ These options can be found in :material-menu:/:fontawesome-solid-ellipsis: → * #### Brave Sync -Το [Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) επιτρέπει στα δεδομένα περιήγησής σας (ιστορικό, σελιδοδείκτες κ. λπ.) να είναι προσβάσιμα σε όλες τις συσκευές σας χωρίς να απαιτείται λογαριασμός και τα προστατεύει με κρυπτογράφηση από άκρο σε άκρο. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## Cromite (Android) @@ -304,7 +304,7 @@ This prevents Siri from using content from Safari for Siri suggestions. - [ ] Disable **Search Engine Suggestions** -This setting sends whatever you type in the address bar to the search engine set in Safari. Η απενεργοποίηση των προτάσεων αναζήτησης σας επιτρέπει να ελέγχετε με μεγαλύτερη ακρίβεια τα δεδομένα που στέλνετε στον πάροχο της μηχανής αναζήτησης. +This setting sends whatever you type in the address bar to the search engine set in Safari. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. #### Profiles diff --git a/i18n/el/news-aggregators.md b/i18n/el/news-aggregators.md index 102badcc..648bd5cb 100644 --- a/i18n/el/news-aggregators.md +++ b/i18n/el/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Παράδειγμα

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index 3a2b810f..86177944 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Διαδικτυακοί @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/el/office-suites.md b/i18n/el/office-suites.md index 43ba82c5..63e3e6c3 100644 --- a/i18n/el/office-suites.md +++ b/i18n/el/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/el/os/windows/group-policies.md b/i18n/el/os/windows/group-policies.md index b62f40db..6e6616c4 100644 --- a/i18n/el/os/windows/group-policies.md +++ b/i18n/el/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index 856b3811..050a253b 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Εισαγωγή στους Κωδικούς :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Εισαγωγή στους Κωδικούς :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Οι προεπιλεγμένοι διαχειριστές κωδικών σε λογισμικά όπως περιηγητές και λειτουργικά συστήματα πολλές φορές δεν μπορούν να ανταγωνιστούν τα εξειδικευμένα λογισμικά διαχείρισης κωδικών. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Για παράδειγμα, ο διαχειριστής κωδικών του Microsoft Edge δεν προσφέρει καθόλου E2EE. Ο διαχειριστής κωδικών της Google διαθέτει [προαιρετικό](https://support.google.com/accounts/answer/11350823) E2EE, ενώ αυτός [της Apple](https://support.apple.com/HT202303) προσφέρει E2EE από προεπιλογή. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Ο διαχειριστής κωδικών της Google διαθέτει [προαιρετικό](https://support.google.com/accounts/answer/11350823) E2EE, ενώ αυτός [της Apple](https://support.apple.com/HT202303) προσφέρει E2EE από προεπιλογή.
@@ -167,15 +167,15 @@ schema: - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/el/pastebins.md b/i18n/el/pastebins.md index 28f50a2f..ed0f463c 100644 --- a/i18n/el/pastebins.md +++ b/i18n/el/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Πρέπει να είναι ανοικτού κώδικα. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/el/photo-management.md b/i18n/el/photo-management.md index 0efe8347..3c8e9750 100644 --- a/i18n/el/photo-management.md +++ b/i18n/el/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/el/privacy.md b/i18n/el/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/el/privacy.md +++ b/i18n/el/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/el/tools.md b/i18n/el/tools.md index 87bf653e..16897cd4 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/el/tor.md b/i18n/el/tor.md index bcc3ecad..189cd7bd 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -31,7 +31,7 @@ schema: **Το Tor** είναι μια ομάδα διακομιστών που λειτουργούν εθελοντικά και σας επιτρέπουν να συνδεθείτε δωρεάν και να βελτιώσετε την ιδιωτικότητα και την ασφάλειά σας στο Διαδίκτυο. Τα άτομα και οι οργανισμοί μπορούν επίσης να μοιράζονται πληροφορίες μέσω του δικτύου Tor με τις κρυφές υπηρεσίες ".onion" χωρίς να θέτουν σε κίνδυνο την ιδιωτικότητά τους. Επειδή η διαδικτυακή κυκλοφορία του Tor είναι δύσκολο να μπλοκαριστεί και να ανιχνευθεί, το Tor είναι ένα αποτελεσματικό εργαλείο παράκαμψης της λογοκρισίας. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Συμβουλή

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index 4753acbd..7f684a74 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/eo/about/donation-acceptance-policy.md b/i18n/eo/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/eo/about/donation-acceptance-policy.md +++ b/i18n/eo/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/eo/advanced/communication-network-types.md b/i18n/eo/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/eo/advanced/communication-network-types.md +++ b/i18n/eo/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/eo/advanced/tor-overview.md b/i18n/eo/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/eo/advanced/tor-overview.md +++ b/i18n/eo/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/eo/ai-chat.md b/i18n/eo/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/eo/ai-chat.md +++ b/i18n/eo/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/eo/alternative-networks.md b/i18n/eo/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/eo/alternative-networks.md +++ b/i18n/eo/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/eo/android/general-apps.md b/i18n/eo/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/eo/android/general-apps.md +++ b/i18n/eo/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/eo/basics/vpn-overview.md b/i18n/eo/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/eo/basics/vpn-overview.md +++ b/i18n/eo/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/eo/basics/why-privacy-matters.md +++ b/i18n/eo/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index a8d28de7..6a1ca89a 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Malaktivaj Atakoj](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Provizantoj de Servoj](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index 9746375a..3c6072a5 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md index a8507937..0f57cad7 100644 --- a/i18n/eo/desktop-browsers.md +++ b/i18n/eo/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 9e0bb6da..d369f071 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/eo/dns.md b/i18n/eo/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/eo/dns.md +++ b/i18n/eo/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/eo/document-collaboration.md b/i18n/eo/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/eo/document-collaboration.md +++ b/i18n/eo/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index 0f75f961..86ba224d 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/eo/health-and-wellness.md b/i18n/eo/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/eo/health-and-wellness.md +++ b/i18n/eo/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/eo/index.md b/i18n/eo/index.md index b181fecd..f200d7ef 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/eo/language-tools.md b/i18n/eo/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/eo/language-tools.md +++ b/i18n/eo/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/eo/maps.md b/i18n/eo/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/eo/maps.md +++ b/i18n/eo/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/eo/meta/admonitions.md b/i18n/eo/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/eo/meta/admonitions.md +++ b/i18n/eo/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/eo/news-aggregators.md b/i18n/eo/news-aggregators.md index 8b3fd1cf..beacc720 100644 --- a/i18n/eo/news-aggregators.md +++ b/i18n/eo/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index a419fe9f..2e4406de 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index 7ba7dd30..a1f88313 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/eo/pastebins.md b/i18n/eo/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/eo/pastebins.md +++ b/i18n/eo/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/eo/photo-management.md b/i18n/eo/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/eo/photo-management.md +++ b/i18n/eo/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/eo/privacy.md b/i18n/eo/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/eo/privacy.md +++ b/i18n/eo/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index 17c6315c..2635b7b8 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index 3f04e880..9aacfdff 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index 0d98886a..79ac97b3 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index 779931a8..4d8c2581 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/es/about/donation-acceptance-policy.md b/i18n/es/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/es/about/donation-acceptance-policy.md +++ b/i18n/es/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/es/advanced/communication-network-types.md b/i18n/es/advanced/communication-network-types.md index 8f493a72..71c19417 100644 --- a/i18n/es/advanced/communication-network-types.md +++ b/i18n/es/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una visión general de varias arquitecturas de red comúnmente util Existen varias arquitecturas de red utilizadas habitualmente para transmitir mensajes entre personas. Estas redes pueden ofrecer diferentes garantías de privacidad, por lo que conviene tener en cuenta tu [modelo de amenaza](../basics/threat-modeling.md) a la hora de decidir qué aplicación utilizar. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Redes centralizadas diff --git a/i18n/es/advanced/tor-overview.md b/i18n/es/advanced/tor-overview.md index 87689968..133bd532 100644 --- a/i18n/es/advanced/tor-overview.md +++ b/i18n/es/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor es una red descentralizada y gratuita diseñada para utilizar I [**Tor**](../alternative-networks.md#tor) es una red gratuita y descentralizada diseñada para usar el Internet con la mayor privacidad posible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor funciona enrutando tu tráfico de Internet a través de servidores operados por voluntarios, en vez de realizar conexiones directas al sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } @@ -35,13 +35,13 @@ Como ya [generalmente recomendamos](../basics/vpn-overview.md) que la gran mayor Conectarse directamente a Tor hará que tu conexión destaque ante cualquier administrador de red local o tu ISP. Detectar y correlacionar este tráfico [se ha hecho](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) en el pasado por administradores de red para identificar y desanonimizar usuarios Tor específicos en su red. Por otra parte, conectarse a una VPN es casi siempre menos sospechoso, porque los proveedores comerciales de VPN son utilizados por los consumidores cotidianos para una variedad de tareas mundanas como eludir las restricciones geográficas, incluso en países con fuertes restricciones de Internet. -Por lo tanto, debes hacer un esfuerzo para ocultar tu dirección IP **antes de** conectarte a la red Tor. Puedes hacerlo simplemente conectándote a una VPN (a través de un cliente instalado en tu ordenador) y luego accediendo a [Tor](../tor.md) de forma normal, a través de Tor Browser, por ejemplo. Esto crea una cadena de conexión como: +Por lo tanto, debes hacer un esfuerzo para ocultar tu dirección IP **antes de** conectarte a la red Tor. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] Tú → VPN → Tor → Internet Desde la perspectiva de tu ISP, parece que estás accediendo normalmente a una VPN (con la cobertura asociada que te proporciona). Desde la perspectiva de tu VPN, pueden ver que te estás conectando a la red Tor, pero nada sobre a qué sitios web estás accediendo. Desde la perspectiva de Tor, te estás conectando normalmente, pero en el improbable caso de algún tipo de compromiso de la red Tor, sólo la IP de tu VPN estaría expuesta, y tu VPN *adicionalmente* tendría que ser comprometida para desanonimizarte. -Esto **no** es un consejo para eludir la censura, porque si Tor está bloqueado completamente por tu ISP, tu VPN probablemente también lo esté. Más bien, esta recomendación tiene como objetivo hacer que tu tráfico se mezcle mejor con el tráfico común de usuarios VPN, y proporcionarte un cierto nivel de negación plausible ocultando el hecho de que se está conectando a Tor a tu ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Más bien, esta recomendación tiene como objetivo hacer que tu tráfico se mezcle mejor con el tráfico común de usuarios VPN, y proporcionarte un cierto nivel de negación plausible ocultando el hecho de que se está conectando a Tor a tu ISP. --- @@ -51,7 +51,7 @@ Nosotros **desaconsejamos encarecidamente** combinar Tor con una VPN de cualquie - Tú → VPN → Tor → VPN → Internet - Cualquier otra configuración -Algunos proveedores de VPN y otras publicaciones recomendarán ocasionalmente estas **malas** configuraciones para evadir las prohibiciones de Tor (nodos de salida bloqueados por sitios web) en algunos lugares. [Normalmente](https://support.torproject.org/#about_change-paths), Tor cambia frecuentemente la ruta de tu circuito a través de la red. Cuando eliges una VPN de *destino* permanente (conectándote a un servidor VPN *después de* Tor), estás eliminando esta ventaja y perjudicando drásticamente tu anonimato. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normalmente](https://support.torproject.org/#about_change-paths), Tor cambia frecuentemente la ruta de tu circuito a través de la red. Cuando eliges una VPN de *destino* permanente (conectándote a un servidor VPN *después de* Tor), estás eliminando esta ventaja y perjudicando drásticamente tu anonimato. Es difícil establecer malas configuraciones como estas accidentalmente, porque normalmente implica establecer configuraciones proxy personalizadas dentro del Navegador Tor, o establecer configuraciones proxy personalizadas dentro de tu cliente VPN que enruta tu tráfico VPN a través de Tor Browser. Mientras evites estas configuraciones no predeterminadas, probablemente estarás bien. @@ -60,7 +60,7 @@ Es difícil establecer malas configuraciones como estas accidentalmente, porque

Huella Digital VPN/SSH

-El Proyecto Tor [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) que *teóricamente* usar una VPN para ocultar las actividades Tor de tu ISP puede no ser infalible. Se ha descubierto que las VPN son vulnerables a las huellas digitales de tráfico de sitios web, en las que un adversario puede adivinar qué sitio web se está visitando, ya que todos los sitios web tienen patrones de tráfico específicos. +El Proyecto Tor [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) que *teóricamente* usar una VPN para ocultar las actividades Tor de tu ISP puede no ser infalible. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Por lo tanto, no es descabellado creer que el tráfico Tor encriptado oculto por una VPN también podría ser detectado mediante métodos similares. No existen trabajos de investigación sobre este tema, y seguimos considerando que las ventajas de utilizar una VPN superan con creces estos riesgos, pero es algo a tener en cuenta. @@ -68,11 +68,11 @@ Si todavía crees que los "pluggable transports" (puentes) proporcionan una prot
-Determinar si deberías usar primero una VPN para conectarte a la red Tor requerirá algo de sentido común y conocimiento de las políticas de tu propio gobierno e ISP en relación a lo que te estás conectando. Sin embargo, de nuevo, en la mayoría de los casos será mejor que te vean conectándose a una red VPN comercial que directamente a la red Tor. Si los proveedores VPN están censurados en tu área, entonces también puedes considerar usar "pluggable transports" Tor (p.e. Snowflake o meek bridges) como alternativa, pero usar estos puentes puede levantar más sospechas que los túneles estándar WireGuard/OpenVPN. +Determinar si deberías usar primero una VPN para conectarte a la red Tor requerirá algo de sentido común y conocimiento de las políticas de tu propio gobierno e ISP en relación a lo que te estás conectando. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## Qué No es Tor -La red Tor no es la herramienta perfecta de protección de la privacidad en todos los casos, y tiene una serie de inconvenientes que deben ser considerados cuidadosamente. Estas cosas no deberían disuadirte de usar Tor si es apropiado para tus necesidades, pero siguen siendo cosas en las que pensar cuando decidas qué solución es la más apropiada para ti. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. Estas cosas no deberían disuadirte de usar Tor si es apropiado para tus necesidades, pero siguen siendo cosas en las que pensar cuando decidas qué solución es la más apropiada para ti. ### Tor no es una VPN gratuita @@ -80,26 +80,26 @@ El lanzamiento de la aplicación móvil *Orbot* ha llevado a mucha gente a descr A diferencia de los nodos de salida de Tor, los proveedores de VPN no suelen ser *activamente* [maliciosos](#caveats). Dado que los nodos de salida de Tor pueden ser creados por cualquiera, son puntos calientes para el registro y modificación de la red. En 2020, se documentó que muchos nodos de salida de Tor degradaban el tráfico HTTPS a HTTP para [secuestrar transacciones de criptomonedas](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). También se han observado otros ataques a nodos de salida, como la sustitución de descargas a través de canales no cifrados por malware. HTTPS mitiga estas amenazas hasta cierto punto. -Como ya hemos aludido, Tor también es fácilmente identificable en la red. A diferencia de un proveedor VPN real, usar Tor te hará destacar como una persona que probablemente intenta evadir a las autoridades. En un mundo perfecto, Tor sería visto por los administradores de red y las autoridades como una herramienta con muchos usos (como se ven las VPN), pero en realidad la percepción de Tor sigue siendo mucho menos legítima que la percepción de las VPN comerciales, por lo que usar una VPN real te proporciona una negación plausible, por ejemplo, "solo la estaba usando para ver Netflix", etc. +Como ya hemos aludido, Tor también es fácilmente identificable en la red. A diferencia de un proveedor VPN real, usar Tor te hará destacar como una persona que probablemente intenta evadir a las autoridades. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### El uso de Tor no es indetectable -**Incluso si usas puentes y transportes conectables (pluggable transports),** el Proyecto Tor no proporciona herramientas para ocultar a tu ISP el hecho de que estás usando Tor. Ni siquiera el uso de "transportes conectables" ofuscados o puentes no públicos ocultan el hecho de que se está utilizando un canal de comunicaciones privado. Los transportes conectables más populares como obfs4 (que ofusca tu tráfico para que "parezca nada") y meek (que utiliza "domain fronting" para camuflar tu tráfico) pueden ser [detectados](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con técnicas de análisis de tráfico bastante estándar. Snowflake tiene problemas similares, y puede [detectarse fácilmente](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) incluso *antes de* que se establezca una conexión Tor. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Ni siquiera el uso de "transportes conectables" ofuscados o puentes no públicos ocultan el hecho de que se está utilizando un canal de comunicaciones privado. Los transportes conectables más populares como obfs4 (que ofusca tu tráfico para que "parezca nada") y meek (que utiliza "domain fronting" para camuflar tu tráfico) pueden ser [detectados](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con técnicas de análisis de tráfico bastante estándar. Snowflake tiene problemas similares, y puede [detectarse fácilmente](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) incluso *antes de* que se establezca una conexión Tor. -Existen transportes conectables distintos de estos tres, pero normalmente se basan en la seguridad a través de la oscuridad para eludir la detección. No son imposibles de detectar, solo que los utiliza tan poca gente que no merece la pena construir detectores para ellos. No se debe confiar en ellos si te están vigilando específicamente. +Existen transportes conectables distintos de estos tres, pero normalmente se basan en la seguridad a través de la oscuridad para eludir la detección. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. No se debe confiar en ellos si te están vigilando específicamente. Es fundamental comprender la diferencia entre eludir la censura y eludir la detección. Es más fácil lograr lo primero debido a las muchas limitaciones del mundo real sobre lo que los censores de red pueden hacer en masa, pero estas técnicas no ocultan el hecho de que tú-*específicamente* tú-estás usando Tor de una parte interesada que monitoriza tu red. ### Tor Browser no es el navegador más *seguro* -El anonimato a menudo puede estar reñido con la seguridad: El anonimato de Tor requiere que cada usuario sea idéntico, lo que crea una monocultura (los mismos bugs están presentes en todos los usuarios de Tor Browser). Como regla general de ciberseguridad, las monoculturas suelen considerarse malas: La seguridad a través de la diversidad (de la que carece Tor) proporciona una segmentación natural al limitar las vulnerabilidades a grupos más pequeños, y por lo tanto suele ser deseable, pero esta diversidad también es menos buena para el anonimato. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). Como regla general de ciberseguridad, las monoculturas suelen considerarse malas: La seguridad a través de la diversidad (de la que carece Tor) proporciona una segmentación natural al limitar las vulnerabilidades a grupos más pequeños, y por lo tanto suele ser deseable, pero esta diversidad también es menos buena para el anonimato. Adicionalmente, Tor Browser está basado en la versión de Soporte Extendido de Firefox, que solo recibe parches para vulnerabilidades consideradas *Críticas* y *Altas* (no *Medias* y *Bajas*). Esto significa que los atacantes podrían (por ejemplo): 1. Buscar nuevas vulnerabilidades Críticas/Altas en las versiones nightly o beta de Firefox, luego comprobar si son explotables en Tor Browser (este periodo de vulnerabilidad puede durar semanas). 2. Encadenar *múltiples* vulnerabilidades Medias/Bajas hasta conseguir el nivel de acceso que buscan (este periodo de vulnerabilidad puede durar meses o más). -Aquellos en riesgo de vulnerabilidades del navegador deberían considerar protecciones adicionales para defenderse contra exploits de Tor Browser, tales como usar Whonix en [Qubes](../os/qubes-overview.md) para contener su navegación Tor en una MV segura y protegerse contra filtraciones. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Creación de Rutas a los Servicios Clearnet @@ -137,7 +137,7 @@ El nodo de salida será elegido al azar de entre todos los nodos Tor disponibles Los "Servicios Onion" (también conocidos comúnmente como "servicios ocultos") son sitios web a los que solo se puede acceder mediante el navegador Tor. Estos sitios web tienen un nombre de dominio largo generado aleatoriamente que termina en `.onion`. -Conectarse a un Servicio Onion en Tor funciona de forma muy similar a conectarse a un servicio clearnet, pero tu tráfico se enruta a través de un total de **seis nodos** antes de llegar al servidor de destino. Sin embargo, al igual que antes, solo tres de estos nodos contribuyen a *tu* anonimato, los otros tres nodos protegen el anonimato del *Servicio Onion*, ocultando la verdadera IP y la ubicación del sitio web de la misma manera que Tor Browser oculta la tuya. +Conectarse a un Servicio Onion en Tor funciona de forma muy similar a conectarse a un servicio clearnet, pero tu tráfico se enruta a través de un total de **seis nodos** antes de llegar al servidor de destino. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Ruta de Tor que muestra tu tráfico siendo enrutado a través de tus tres nodos Tor más tres nodos Tor adicionales que ocultan la identidad del sitio web](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Conectarse a un Servicio Onion en Tor funciona de forma muy similar a conectarse ## Cifrado -Tor encripta cada paquete (un bloque de datos transmitidos) tres veces con las claves del nodo de salida, medio y de entrada, en ese orden. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Una vez que Tor ha construido un circuito, la transmisión de datos se realiza de la siguiente manera: -1. En primer lugar: cuando el paquete llega al nodo de entrada, se elimina la primera capa de cifrado. En este paquete encriptado, el nodo de entrada encontrará otro paquete encriptado con la dirección del nodo intermedio. El nodo de entrada reenviará entonces el paquete al nodo intermedio. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. En este paquete encriptado, el nodo de entrada encontrará otro paquete encriptado con la dirección del nodo intermedio. El nodo de entrada reenviará entonces el paquete al nodo intermedio. -2. Segundo: cuando el nodo intermedio recibe el paquete del nodo de entrada, también elimina una capa de encriptación con su clave, y esta vez encuentra un paquete encriptado con la dirección del nodo de salida. El nodo intermedio reenviará entonces el paquete al nodo de salida. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. El nodo intermedio reenviará entonces el paquete al nodo de salida. -3. Por último, cuando el nodo de salida reciba su paquete, eliminará la última capa de cifrado con su clave. El nodo de salida verá la dirección de destino y reenviará el paquete a esa dirección. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. El nodo de salida verá la dirección de destino y reenviará el paquete a esa dirección. A continuación se presenta un diagrama alternativo que muestra el proceso. Cada nodo elimina su propia capa de encriptación, y cuando el servidor de destino devuelve los datos, el mismo proceso ocurre completamente a la inversa. Por ejemplo, el nodo de salida no sabe quién eres, pero sí sabe de qué nodo procede, por lo que añade su propia capa de encriptación y lo envía de vuelta. @@ -185,7 +185,7 @@ Si deseas utilizar Tor para navegar por la web, sólo recomendamos el navegador Los puentes Tor se promocionan comúnmente como un método alternativo para ocultar el uso de Tor a un ISP, en lugar de una VPN (como sugerimos usar si es posible). Algo a tener en cuenta es que aunque los puentes pueden proporcionar una adecuada elusión de la censura, esto es solo un beneficio *transitorio*. No te protegen adecuadamente de que tu ISP descubra que te conectaste a Tor en el *pasado* con análisis de registros históricos de tráfico. -Para ilustrar este punto, considera el siguiente escenario: Te conectas a Tor a través de un puente, y tu ISP no lo detecta porque no están haciendo un análisis sofisticado de tu tráfico, por lo que las cosas están funcionando como estaba previsto. Ahora, pasan 4 meses, y la IP de tu puente se ha hecho pública. Esto es algo muy común con los puentes, se descubren y bloquean con relativa frecuencia, solo que no inmediatamente. +Para ilustrar este punto, considera el siguiente escenario: Te conectas a Tor a través de un puente, y tu ISP no lo detecta porque no están haciendo un análisis sofisticado de tu tráfico, por lo que las cosas están funcionando como estaba previsto. Ahora, pasan 4 meses, y la IP de tu puente se ha hecho pública. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Tu ISP quiere identificar a los usuarios de Tor de hace 4 meses, y con su limitado registro de metadatos pueden ver que te conectaste a una dirección IP que más tarde se reveló que era un puente Tor. Prácticamente no tienes otra excusa para estar haciendo esa conexión, así que el ISP puede decir con mucha confianza que eras un usuario de Tor en ese momento. @@ -193,7 +193,7 @@ Contrasta esto con nuestro escenario recomendado, donde te conectas a Tor a trav Como es casi seguro que tu ISP no está capturando todos los datos a nivel de paquete y almacenándolos para siempre, no tienen forma de determinar a qué te has conectado con esa VPN *después de* haberlo hecho con una técnica avanzada como la inspección profunda de paquetes, y por lo tanto tienes una negación plausible. -Por lo tanto, los puentes proporcionan el mayor beneficio a la hora de eludir la censura en Internet *en el momento*, pero no son un sustituto adecuado para **todos** los beneficios que puede proporcionar el uso de una VPN junto con Tor. De nuevo, este no es un consejo *en contra de* usar puentes Tor, solo deberías ser consciente de estas limitaciones mientras tomas tu decisión. En algunos casos, los puentes pueden ser la*única * opción (si todos los proveedores de VPN están bloqueados, por ejemplo), así que puedes seguir utilizándolos en esas circunstancias teniendo en cuenta esta limitación. +Por lo tanto, los puentes proporcionan el mayor beneficio a la hora de eludir la censura en Internet *en el momento*, pero no son un sustituto adecuado para **todos** los beneficios que puede proporcionar el uso de una VPN junto con Tor. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. En algunos casos, los puentes pueden ser la*única * opción (si todos los proveedores de VPN están bloqueados, por ejemplo), así que puedes seguir utilizándolos en esas circunstancias teniendo en cuenta esta limitación. Si crees que un puente puede ayudarte a defenderte contra el fingerprinting (huella digital) u otros análisis avanzados de red más de lo que ya lo hace el túnel encriptado de una VPN, siempre tienes la opción de utilizar también un puente junto con una VPN. De este modo, seguirás protegido por las técnicas de ofuscación del transporte conectable, incluso si un adversario consigue algún nivel de visibilidad en tu túnel VPN. Si decides seguir este camino, te recomendamos que te conectes a un puente obfs4 detrás de tu VPN para obtener una protección óptima contra huellas digitales, en lugar de meek o Snowflake. @@ -205,6 +205,6 @@ Es [posible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-with-re - [Cómo Funciona Tor - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Servicios Tor Onion - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: El primer repetidor en tu circuito se llama "guardia de entrada" o "guardia". Es un repetidor rápido y estable que se mantiene como el primero en tu circuito durante 2-3 meses para protegerse de un ataque conocido de ruptura del anonimato. El resto de tu circuito cambia con cada nuevo sitio web que visitas, y todos juntos estos repetidores proporcionan las protecciones de privacidad completas de Tor. Para obtener más información sobre el funcionamiento de los repetidores de protección, consulta esta [entrada del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) y el [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre los guardias de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: El primer repetidor en tu circuito se llama "guardia de entrada" o "guardia". Es un repetidor rápido y estable que se mantiene como el primero en tu circuito durante 2-3 meses para protegerse de un ataque conocido de ruptura del anonimato. El resto de tu circuito cambia con cada nuevo sitio web que visitas, y todos juntos estos repetidores proporcionan las protecciones de privacidad completas de Tor. Para obtener más información sobre el funcionamiento de los repetidores de protección, consulta esta [entrada del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) y el [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre los guardias de entrada. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Bandera de repetidor: una (des)calificación de los repetidores para las posiciones de los circuitos (por ejemplo, "Guardia", "Salida", "MalaSalida"), las propiedades de los circuitos (por ejemplo, "Rápido", "Estable"), o los roles (por ejemplo, "Autoridad", "HSDir"), tal y como los asignan las autoridades de los directorios y se definen con más detalle en la especificación del protocolo del directorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Bandera de repetidor: una (des)calificación de los repetidores para las posiciones de los circuitos (por ejemplo, "Guardia", "Salida", "MalaSalida"), las propiedades de los circuitos (por ejemplo, "Rápido", "Estable"), o los roles (por ejemplo, "Autoridad", "HSDir"), tal y como los asignan las autoridades de los directorios y se definen con más detalle en la especificación del protocolo del directorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/es/ai-chat.md b/i18n/es/ai-chat.md index a007baaf..d4136a0a 100644 --- a/i18n/es/ai-chat.md +++ b/i18n/es/ai-chat.md @@ -44,7 +44,7 @@ Para ejecutar IA localmente, se necesita tanto un modelo de IA como un cliente d Hay muchos modelos con licencia permisiva disponibles para descargar. [Hugging Face](https://huggingface.co/models) es una plataforma que te permite navegar, investigar y descargar modelos en formatos comunes como [GGUF](https://huggingface.co/docs/hub/en/gguf). Entre las empresas que ofrecen buenos modelos open-weights figuran grandes nombres como Mistral, Meta, Microsoft y Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. Como ya se ha mencionado, los modelos cuantificados ofrecen el mejor equilibrio entre calidad de modelo y rendimiento para quienes utilizan hardware de consumo personal. -Para ayudarte a elegir un modelo que se adapte a tus necesidades, puedes consultar tablas de clasificación y puntos de referencia. La tabla de clasificación más utilizada es la de la comunidad [LM Arena](https://lmarena.ai). Además, la [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) se centra en el rendimiento de los modelos open-weights en puntos de referencia comunes como [MMLU-Pro](https://arxiv.org/abs/2406.01574). También existen puntos de referencia especializados que miden factores como [inteligencia emocional](https://eqbench.com), [«inteligencia general no censurada»](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), y [muchos otros](https://www.nebuly.com/blog/llm-leaderboards). +Para ayudarte a elegir un modelo que se adapte a tus necesidades, puedes consultar tablas de clasificación y puntos de referencia. La tabla de clasificación más utilizada es la de la comunidad [LM Arena](https://lmarena.ai). Además, la [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) se centra en el rendimiento de los modelos open-weights en puntos de referencia comunes como [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## Clientes de Chat IA @@ -67,13 +67,13 @@ Para ayudarte a elegir un modelo que se adapte a tus necesidades, puedes consult Además de soportar una amplia gama de modelos de texto, Kobold.cpp también soporta generadores de imágenes como [Stable Diffusion](https://stability.ai/stable-image) y herramientas de reconocimiento automático de voz como [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Página Principal](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Código Fuente" } -[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Política de Seguridad" } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } +[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
-Downloads "Descargas" +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases) - [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases) @@ -108,7 +108,7 @@ Además de soportar una amplia gama de modelos de texto, Ollama también soporta [:octicons-lock-16:](https://github.com/ollama/ollama/blob/a14f76491d694b2f5a0dec6473514b7f93beeea0/SECURITY.md){ .card-link title="Política de Seguridad" }
-Downloads "Descargas" +Downloads - [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows) - [:simple-apple: macOS](https://ollama.com/download/mac) @@ -124,19 +124,19 @@ Ollama simplifica el proceso de creación de un chat de IA local descargando aut
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. Está [respaldado por Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) y disponible en Linux, macOS y Windows. Llamafile también es compatible con LLaVA. Sin embargo, no admite el reconocimiento de voz ni la generación de imágenes. -[:octicons-home-16: Página Principal](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Código Fuente" } -[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Política de Seguridad" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } +[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
-Downloads "Descargas" +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart) - [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart) diff --git a/i18n/es/alternative-networks.md b/i18n/es/alternative-networks.md index d424a7aa..b55a286f 100644 --- a/i18n/es/alternative-networks.md +++ b/i18n/es/alternative-networks.md @@ -59,7 +59,7 @@ Puedes acceder a _Privacy Guides_ a través de tor en [xoe4vn5uwdztif6goazfbmogh [:octicons-heart-16:](https://orbot.app/donate){ .card-link title="Contribute" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) @@ -129,7 +129,7 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or [:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribuir }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) - [:simple-android: Android](https://geti2p.net/en/download#android) @@ -154,5 +154,6 @@ Además, a diferencia de Tor, cada nodo de I2P retransmite el tráfico para otro Sin embargo, I2P presenta sus desventajas. La dependencia de Tor en nodos de salida dedicados significa que más personas en entornos menos seguros pueden usarlo, y los repetidores que existen en Tor son probablemente más eficientes y estables, porque generalmente no son ejecutados en conexiones residenciales. Tor también está más enfocado en la **privacidad del navegador** (ej: protección ante las huellas dactilares), con un [Navegador Tor](tor.md) dedicado para anonimizar la actividad de navegación lo máximo posible. I2P es usado a través de tu [navegador regular de Internet](desktop-browsers.md) y mientras puedes configurar tu navegador para que proteja mejor tu privacidad, probablemente tu navegador no tiene la misma huella dactilar que otros usuarios de I2P (no hay una "multitud" para camuflarte). +Es probable que Tor sea más resistente a la censura, debido a su robusta red de puentes y diversos [transportes conectables](https://tb-manual.torproject.org/circumvention). Por otro lado, I2P usa servidores de directorio para la conexión inicial, que pueden ser variables/no fiables y ejecutados por voluntarios, a comparación de los codificados/fiables que Tor usa y probablemente son más fáciles de bloquear. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Es probable que Tor sea más resistente a la censura, debido a su robusta red de puentes y diversos [transportes conectables](https://tb-manual.torproject.org/circumvention). Por otro lado, I2P usa servidores de directorio para la conexión inicial, que pueden ser variables/no fiables y ejecutados por voluntarios, a comparación de los codificados/fiables que Tor usa y probablemente son más fáciles de bloquear. diff --git a/i18n/es/android/general-apps.md b/i18n/es/android/general-apps.md index 46ebe9f8..b14e3e54 100644 --- a/i18n/es/android/general-apps.md +++ b/i18n/es/android/general-apps.md @@ -70,13 +70,13 @@ Se recomienda Shelter en lugar de [Insular](https://secure-system.gitlab.io/Insu **Secure Camera** es una aplicación de cámara centrada en la privacidad y la seguridad que puede capturar imágenes, vídeos y códigos QR. Las extensiones del proveedor CameraX (Retrato, HDR, Vista Nocturna, Retoque Facial y Automático) también son compatibles en los dispositivos disponibles. -[:octicons-repo-16: Repositorio](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } -[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases) @@ -116,12 +116,12 @@ Los metadatos de orientación de la imagen no se borran. Si activas la localizac [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) se utiliza para reforzar que las propiedades JavaScript y de estilo dentro del WebView sean enteramente contenido estático. -[:octicons-repo-16: Repositorio](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Cñodigo Fuente" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases) diff --git a/i18n/es/android/obtaining-apps.md b/i18n/es/android/obtaining-apps.md index 8051aaa0..38e25249 100644 --- a/i18n/es/android/obtaining-apps.md +++ b/i18n/es/android/obtaining-apps.md @@ -19,7 +19,7 @@ Hay varias formas para obtener aplicaciones de Android de una manera privada, in [:octicons-heart-16:](https://github.com/sponsors/ImranR98){ .card-link title=Contribuir }
-Downloads "Descargas" +Downloads - [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases) @@ -48,7 +48,7 @@ Google Play Store requiere una cuenta de Google para iniciar sesión, algo poco [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Código fuente" }
-Downloads "Descargas" +Downloads - [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases) diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 4f2aa3bd..89c2b461 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Las Redes Privadas Virtuales desplazan el riesgo de tu ISP a un ter Las Redes Privadas Virtuales son una forma de ampliar el extremo de tu red para que salga por otro lugar en el mundo. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normalmente, un ISP puede ver el flujo de tráfico de Internet que entra y sale de Tu dispositivo de terminación de red (es decir, el módem). Los protocolos de cifrado como HTTPS se utilizan habitualmente en Internet, por lo que es posible que no puedan ver exactamente lo que publicas o lees, pero pueden hacerse una idea de los [dominios que solicitas](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md index b5687272..66df5c74 100644 --- a/i18n/es/basics/why-privacy-matters.md +++ b/i18n/es/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ En última instancia, la privacidad tiene que ver con la información humana, y Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacidad** @@ -58,7 +58,7 @@ Por ejemplo, los formularios de consentimiento de cookies. Es posible que los en La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Fuentes diff --git a/i18n/es/browser-extensions.md b/i18n/es/browser-extensions.md index 42092068..72979106 100644 --- a/i18n/es/browser-extensions.md +++ b/i18n/es/browser-extensions.md @@ -31,7 +31,7 @@ No instales extensiones que no necesites de inmediato o que dupliquen la funcion [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) @@ -68,7 +68,7 @@ uBlock Origin también tiene una versión "Lite" de su extensión, que ofrece un [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh) @@ -100,7 +100,7 @@ Recomendamos [Safari](mobile-browsers.md#safari-ios) para los usuarios de iOS, q [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162) diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 24354027..950a63a1 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Ataques pasivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Proveedores de servicios](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Muchos **proveedores de almacenamiento en la nube** exigen que confíes plenamente en que no mirarán tus archivos. Las alternativas enumeradas a continuación eliminan la necesidad de confianza mediante la implementación de E2EE seguros. +Muchos **proveedores de almacenamiento en la nube** exigen que confíes plenamente en que no mirarán tus archivos. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Si estas alternativas no se ajustan a tus necesidades, te sugerimos que busques utilizar un software de encriptación como [Cryptomator](encryption.md#cryptomator-cloud) con otro proveedor en la nube. Utilizar Cryptomator junto con **cualquier** proveedor de la nube(incluidos estos) puede ser una buena idea para reducir el riesgo de fallos de cifrado en los clientes nativos de un proveedor. @@ -28,7 +28,9 @@ Nextcloud [sigue siendo una herramienta recomendada](document-collaboration.md#n ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** es un proveedor de almacenamiento cifrado en la nube del popular proveedor de correo electrónico cifrado [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** es un proveedor de almacenamiento cifrado en la nube del popular proveedor de correo electrónico cifrado [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Página Principal](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Política de Privacidad" } @@ -47,9 +49,7 @@ Nextcloud [sigue siendo una herramienta recomendada](document-collaboration.md#n
-La aplicación web de Proton Drive ha sido auditada de forma independiente por Securitum en [2021](https://proton.me/community/open-source). - -Los nuevos clientes móviles de Proton Drive aún no han sido auditados públicamente por terceros. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,17 +76,19 @@ Los nuevos clientes móviles de Proton Drive aún no han sido auditados pública -Tresorit ha recibido varias auditorías de seguridad independientes: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1][Certificación de](https://certipedia.com/quality_marks/9108644476) Conformidad por TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Pruebas de Penetración por Computest - Esta revisión evaluó la seguridad del cliente web Tresorit, la aplicación Android, la aplicación Windows y la infraestructura asociada. - Computest descubrió dos vulnerabilidades que ya han sido resueltas. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Pruebas de Penetración por Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - En esta revisión se analizó el código fuente completo de Tresorit y se validó que la implementación coincide con los conceptos descritos en el [libro blanco](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) de Tresorit. - - Ernst & Young probó además los clientes web, móvil y de escritorio: "Los resultados de las pruebas no encontraron ninguna desviación de las afirmaciones de confidencialidad de datos de Tresorit". + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: -También han recibido el Digital Trust Label, una certificación de la [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) que exige superar [35 criterios](https://swiss-digital-initiative.org/criteria) relacionados con la seguridad, la privacidad y la fiabilidad. + > Test results found no deviation from Tresorit’s data confidentiality claims. + +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. ## Peergos @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Requisitos Mínimos -- Debe aplicar el cifrado de extremo a extremo. +- Must enforce E2EE. - Debe ofrecer un plan gratuito o un periodo de prueba. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Debe ofrecer una interfaz web que admita funciones básicas de gestión de archivos. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. - Los clientes deben ser de código abierto. -- Los clientes deben ser auditados en su totalidad por un tercero independiente. +- Clients should be audited in their entirety by an independent third party. - Debe ofrecer clientes nativos para Linux, Android, Windows, macOS e iOS. - Estos clientes deben integrarse con las herramientas nativas del sistema operativo para los proveedores de almacenamiento en la nube, como la integración de la aplicación Files en iOS, o la funcionalidad DocumentsProvider en Android. -- Debe permitir compartir archivos fácilmente con otros usuarios. +- Should support easy file sharing with other users. - Debe ofrecer al menos funciones básicas de previsualización y edición de archivos en la interfaz web. [^1]: [El cumplimiento de la norma ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 se refiere al sistema de gestión de la seguridad de la información de la empresa [](https://en.wikipedia.org/wiki/Information_security_management) y abarca la venta, el desarrollo, el mantenimiento y la asistencia de sus servicios en la nube. diff --git a/i18n/es/data-broker-removals.md b/i18n/es/data-broker-removals.md index 9af8eddf..6286e154 100644 --- a/i18n/es/data-broker-removals.md +++ b/i18n/es/data-broker-removals.md @@ -121,7 +121,7 @@ En nuestras pruebas, esta herramienta funcionó para eliminar de forma fiable lo ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Te sugerimos que te familiarices con esta lista antes de elegir un servicio de eliminación de datos, y que lleves a cabo tu propia investigación para asegurarte de que es la opción adecuada para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Te sugerimos que te familiarices con esta lista antes de elegir un servicio de eliminación de datos, y que lleves a cabo tu propia investigación para asegurarte de que es la opción adecuada para ti. Nuestras selecciones de servicios de eliminación se basan principalmente en pruebas profesionales independientes realizadas por terceros, como se indica en las secciones anteriores, en nuestras propias pruebas internas y en los comentarios agregados de nuestra comunidad. diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 862409c6..7e6a6523 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -32,9 +32,9 @@ No se debe **nunca** utilizar el desenfoque para eliminar [texto en imágenes](h [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,11 +51,11 @@ No se debe **nunca** utilizar el desenfoque para eliminar [texto en imágenes](h **ExifEraser** es una moderna aplicación de borrado de metadatos de imagen sin permisos para Android. -Actualmente admite archivos JPEG, PNG y WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repositorio](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Código Fuente" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
Downloads "Descargas" diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index 44d8dcb0..ea880d41 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -91,7 +91,7 @@ Si necesitas navegar por Internet de forma anónima, deberías utilizar [Tor](to Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Si deseas configurar tu navegador de forma más exhaustiva y la huella digital no te preocupa, te recomendamos [Firefox](#firefox) en su lugar. diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index 84f925f6..31997458 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -24,8 +24,8 @@ Las distribuciones de Linux se recomiendan comúnmente para la protección de la **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generalmente adopta tecnologías más nuevas (por ejemplo, [Wayland](https://wayland.freedesktop.org) y [PipeWire](https://pipewire.org)) antes que otras distribuciones. Estas nuevas tecnologías suelen venir acompañadas de mejoras en la seguridad, la privacidad y la usabilidad en general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -45,9 +45,9 @@ Fedora tiene un ciclo de lanzamientos semicontinuo. While some packages like the openSUSE Tumbleweed utiliza [Btrfs](https://es.wikipedia.org/wiki/Btrfs) y [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) para garantizar que las instantáneas se puedan revertir en caso de que se produzca algún problema. -[:octicons-home-16: Página principal](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentación} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribuir} +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -63,9 +63,9 @@ Tumbleweed sigue un modelo de actualización continua en el que cada actualizaci **Arch Linux** es una distribución ligera, "hágalo usted mismo" (DIY), lo que significa que solo tienes lo que instalas. Para obtener más información, consulte su [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Página Principal](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentación} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -89,9 +89,9 @@ Gran parte de [los paquetes de Arch Linux](https://reproducible.archlinux.org) s **Fedora Atomic Desktops** son variantes de Fedora que utilizan el gestor de paquetes `rpm-ostree` y se centran principalmente en flujos de trabajo en contenedores y Flatpak para aplicaciones de escritorio. Todas estas variantes siguen el mismo calendario de lanzamientos que Fedora Workstation, beneficiándose de las mismas actualizaciones rápidas y manteniéndose muy cerca del upstream. -[:octicons-home-16: Página Principal](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentación} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -115,9 +115,9 @@ Como alternativa a Flatpaks, existe la opción de [Toolbx](https://docs.fedorapr NixOS es una distribución independiente basada en el gestor de paquetes Nix y centrada en la reproducibilidad y la fiabilidad. -[:octicons-home-16: Página Principal](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentación} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -143,10 +143,10 @@ Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paqu **Whonix** está basado en [Kicksecure](#kicksecure), una bifurcación de Debian centrada en la seguridad. Su objetivo es proporcionar privacidad, seguridad y [:material-incognito: Anonimato](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } en Internet. Whonix se utiliza mejor junto con [Qubes OS](#qubes-os). -[:octicons-home-16: Página Principal](https://whonix.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentación} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -166,9 +166,9 @@ Whonix se utiliza mejor [junto con Qubes](https://whonix.org/wiki/Qubes/Why_use_ **Tails** es un sistema operativo basado en Debian que enruta todas las comunicaciones a través de Tor, y que puede arrancar en casi cualquier ordenador desde un DVD, una memoria USB o una tarjeta SD. Utiliza [Tor](tor.md) para preservar la privacidad y el [:material-incognito: Anonimato](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } mientras elude la censura, y no deja rastro de sí mismo en el ordenador en el que se utiliza una vez apagado. -[:octicons-home-16: Página Principal](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentación} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -201,12 +201,12 @@ Tails está diseñado para formatearse por completo después de cada reinicio. E **Qubes OS** es un sistema operativo de código abierto diseñado para proporcionar una fuerte seguridad para la informática de escritorio a través de máquinas virtuales seguras (o "qubes"). Qubes se basa en Xen, el Sistema de Ventanas X y Linux. Puede ejecutar la mayoría de las aplicaciones Linux y utilizar la mayoría de los controladores Linux. -[:octicons-home-16: Página Principal](https://qubes-os.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servicio Onion" } -[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentación } -[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -245,11 +245,11 @@ Aunque en la mayoría de los casos [desaconsejamos](os/linux-overview.md#release **Kicksecure** -en términos muy simplificados- es un conjunto de scripts, configuraciones y paquetes que reducen sustancialmente la superficie de ataque de Debian. Cubre muchas recomendaciones de privacidad y seguridad por defecto. También sirve de sistema operativo base para [Whonix](#whonix). -[:octicons-home-16: Página Principal](https://kicksecure.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentación } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/es/device-integrity.md b/i18n/es/device-integrity.md index ccd92b54..01cc5392 100644 --- a/i18n/es/device-integrity.md +++ b/i18n/es/device-integrity.md @@ -78,7 +78,7 @@ Estas herramientas pueden desencadenar falsos positivos. Si alguna de estas herr [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) - [:simple-linux: Linux](https://docs.mvt.re/en/latest/install) @@ -121,7 +121,7 @@ MVT te permite realizar escaneos/análisis más profundos si tu dispositivo tien [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentación}
-Downloads "Descargas" +Downloads - [:fontawesome-brands-windows: Windows](https://imazing.com/download) - [:simple-apple: macOS](https://imazing.com/download) @@ -164,7 +164,7 @@ El uso de estas aplicaciones no basta para determinar que un dispositivo está " [:octicons-heart-16:](https://attestation.app/donate){ .card-link title="Contribuir"}
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases) diff --git a/i18n/es/dns.md b/i18n/es/dns.md index 95b205f2..6fb05e9a 100644 --- a/i18n/es/dns.md +++ b/i18n/es/dns.md @@ -85,10 +85,10 @@ These DNS filtering solutions offer a web dashboard where you can customize the **Control D** es un servicio DNS personalizable que permite bloquear amenazas de seguridad, contenidos no deseados y publicidad a nivel de DNS. Además de sus planes de pago, ofrecen una serie de resolvedores DNS preconfigurados que puedes utilizar gratuitamente. -[:octicons-home-16: Página Principal](https://controld.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
Downloads @@ -112,10 +112,10 @@ These DNS filtering solutions offer a web dashboard where you can customize the **NextDNS** es un servicio DNS personalizable que te permite bloquear amenazas de seguridad, contenidos no deseados y publicidad a nivel DNS. Ofrecen un plan gratuito totalmente funcional para uso limitado. -[:octicons-home-16: Página Principal](https://nextdns.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
Downloads @@ -149,10 +149,10 @@ El software de proxy de DNS cifrado proporciona un proxy local para que el servi **RethinkDNS** is an open-source Android client that supports [DoH](advanced/dns-overview.md#dns-over-https-doh), [DoT](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy. También proporciona funciones adicionales, como el almacenamiento en caché de las respuestas DNS, el registro local de las consultas DNS y el uso de la aplicación como cortafuegos. -[:octicons-home-16: Página Principal](https://rethinkdns.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
Descargas @@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repositorio](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Descargas diff --git a/i18n/es/document-collaboration.md b/i18n/es/document-collaboration.md index 5bb444b4..8d30ff0d 100644 --- a/i18n/es/document-collaboration.md +++ b/i18n/es/document-collaboration.md @@ -28,7 +28,7 @@ La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que sign [:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribuir }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) @@ -54,7 +54,7 @@ No recomendamos utilizar la [aplicación con cifrado de extremo a extremo](https ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** es una alternativa privada a las herramientas ofimáticas más populares. Todos los contenidos de este servicio web están cifrados de extremo a extremo y pueden compartirse fácilmente con otros usuarios. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** es una alternativa privada a las herramientas ofimáticas más populares. Todos los contenidos de este servicio web están cifrados de extremo a extremo y pueden compartirse fácilmente con otros usuarios. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Página Principal](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Política de Privacidad" } @@ -68,7 +68,7 @@ No recomendamos utilizar la [aplicación con cifrado de extremo a extremo](https ### Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. #### Requisitos Mínimos diff --git a/i18n/es/email-aliasing.md b/i18n/es/email-aliasing.md index ea03e859..359e07c0 100644 --- a/i18n/es/email-aliasing.md +++ b/i18n/es/email-aliasing.md @@ -65,7 +65,7 @@ Usar un servicio de alias requiere confiar tus mensajes sin encriptar a tu prove [:octicons-heart-16:](https://addy.io/donate){ .card-link title="Contribute" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://addy.io/faq/#is-there-an-android-app) - [:simple-appstore: App Store](https://addy.io/faq/#is-there-an-ios-app) @@ -106,7 +106,7 @@ Si cancelas tu suscripción, disfrutarás de las características de tu plan de [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index 38351896..973d6b91 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -65,9 +65,9 @@ La documentación de Cryptomator detalla con más detalle su [objetivo de seguri **Picocrypt** es una herramienta de cifrado pequeña y simple que proporciona un cifrado moderno. Picocrypt utiliza el cifrado seguro XChaCha20 y la función de derivación de clave Argon2id para proporcionar un alto nivel de seguridad. Utiliza los módulos x/crypto estándar de Go para sus funciones de cifrado. -[:octicons-repo-16: Repositorio](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribuir" } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
Downloads "Descargas" @@ -207,9 +207,9 @@ Le recomendamos que no utilice su cuenta de iCloud para la recuperación; en su **LUKS** es el método FDE por defecto para Linux. Puede utilizarse para cifrar volúmenes completos, particiones o crear contenedores cifrados. -[:octicons-home-16: Página Principal](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentación" } -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Código Fuente" } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
diff --git a/i18n/es/health-and-wellness.md b/i18n/es/health-and-wellness.md index 073adf44..0728d8ab 100644 --- a/i18n/es/health-and-wellness.md +++ b/i18n/es/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
@@ -155,7 +155,7 @@ CommonHealth is only available in the United States. Although the app itself is ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. ### Requisitos Mínimos diff --git a/i18n/es/index.md b/i18n/es/index.md index f28588e2..54d4115c 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -115,6 +115,6 @@ En la era moderna de explotación de información digital, tu privacidad nunca h Muchas personas confunden los conceptos de privacidad, seguridad y anonimato. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/es/language-tools.md b/i18n/es/language-tools.md index 55f3284e..2087e99e 100644 --- a/i18n/es/language-tools.md +++ b/i18n/es/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Proveedores de Servicios](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Capitalismo de Vigilancia](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -El texto introducido en los correctores gramaticales, ortográficos y de estilo, así como en los servicios de traducción, puede contener información sensible que puede ser almacenada en sus servidores por tiempo indefinido y vendida a terceros. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +El texto introducido en los correctores gramaticales, ortográficos y de estilo, así como en los servicios de traducción, puede contener información sensible que puede ser almacenada en sus servidores por tiempo indefinido y vendida a terceros. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -21,19 +21,19 @@ El texto introducido en los correctores gramaticales, ortográficos y de estilo, **LanguageTool** is a multilingual grammar, style, and spell checker that supports more than 20 languages. According to their privacy policy, they do not store any content sent to their service for review, but for higher assurance the software is [self-hostable](https://dev.languagetool.org/http-server). -[:octicons-home-16: Página Principal](https://languagetool.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1534275760) - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) @@ -45,7 +45,7 @@ LanguageTool ofrece integración con diversos [paquetes ofimáticos](https://lan ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. - Debe ser de código abierto. - Debe ser posible el autoalojamiento. diff --git a/i18n/es/maps.md b/i18n/es/maps.md index 869a7d24..adae3d3f 100644 --- a/i18n/es/maps.md +++ b/i18n/es/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,17 +58,19 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. ### Requisitos Mínimos diff --git a/i18n/es/meta/admonitions.md b/i18n/es/meta/admonitions.md index 7201ac29..3d8e7ddb 100644 --- a/i18n/es/meta/admonitions.md +++ b/i18n/es/meta/admonitions.md @@ -3,7 +3,7 @@ title: Advertencias description: Una guía para colaboradores del sitio web sobre la creación de advertencias. --- -**Las advertencias** (o "llamadas de atención") son una opción que los redactores pueden utilizar para incluir contenidos secundarios en un artículo sin interrumpir el flujo del documento. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Ejemplo de Advertencia

@@ -41,7 +41,7 @@ TEXTO INCLUIDO
``` -Debe especificarse el `TÍTULO`, si no deseas un título específico puedes establecerlo con el mismo texto que el `TIPO` (véase más abajo) en el caso del título, por ejemplo, `Nota`. El "TEXTO INCLUIDO" debe tener formato Markdown. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. El "TEXTO INCLUIDO" debe tener formato Markdown. ### Tipos habituales @@ -166,15 +166,15 @@ Este formato se utiliza para generar tarjetas de recomendación. En particular, ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Admite la sincronización y compartición de álbumes, así como una variedad de otras [características](https://www.photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Página Principal](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Downloads "Descargas +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -189,15 +189,15 @@ Este formato se utiliza para generar tarjetas de recomendación. En particular, ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Permite sincronizar y compartir álbumes y tiene otras muchas [funciones](https://photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Página Principal](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -209,15 +209,15 @@ Este formato se utiliza para generar tarjetas de recomendación. En particular, #### `downloads` -Se trata de un tipo especial de advertencia plegable, utilizada para generar la sección de enlaces de descarga. Solo se utiliza dentro de las tarjetas de recomendación, como se muestra en el ejemplo anterior. +This is a special type of collapsible admonition which is used to generate sections containing download links. Solo se utiliza dentro de las tarjetas de recomendación, como se muestra en el ejemplo anterior. ```markdown title="Downloads Section"
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -229,11 +229,11 @@ Se trata de un tipo especial de advertencia plegable, utilizada para generar la
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ Se trata de un tipo especial de advertencia plegable, utilizada para generar la ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! nota @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa.
-**Este formato ya no se utiliza en adelante,** porque es incompatible con las nuevas versiones de nuestro software de traducción en Crowdin. Al añadir una nueva página al sitio, solo debe utilizarse el nuevo formato basado en HTML. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -No hay prisa por convertir las advertencias con el formato antiguo al nuevo. Las páginas que actualmente utilizan este formato deberían seguir funcionando, pero las iremos actualizando para que utilicen el nuevo formato basado en HTML a medida que sigamos actualizando el sitio. +No hay prisa por convertir las advertencias con el formato antiguo al nuevo. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index 026ef872..6e5eaafd 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -42,10 +42,10 @@ Un **agregador de noticias** es un programa informático que reúne contenidos d ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** es un lector de noticias de código abierto, moderno y fácil de usar para Linux. Puede utilizarse sin conexión o con servicios como [Nextcloud News](https://apps.nextcloud.com/apps/news) o [Inoreader](https://inoreader.com). Dispone de una función de búsqueda y una lista predefinida de fuentes que puedes añadir directamente. +**NewsFlash** es un lector de noticias de código abierto, moderno y fácil de usar para Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). Dispone de una función de búsqueda y una lista predefinida de fuentes que puedes añadir directamente. -[:octicons-repo-16: Repositorio](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Código Fuente" } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
Downloads "Descargas" @@ -62,11 +62,13 @@ Un **agregador de noticias** es un programa informático que reúne contenidos d ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** es un cliente RSS moderno para Android que tiene muchas [características](https://github.com/spacecowboy/Feeder#features) y funciona bien con carpetas de fuentes RSS. Es compatible con [RSS](https://es.wikipedia.org/wiki/RSS), [Atom](https://es.wikipedia.org/wiki/Atom_(formato_de_redifusi%C3%B3n)), [RDF](https://es.wikipedia.org/wiki/RDF/XML) y [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** es un cliente RSS moderno para Android que tiene muchas [características](https://github.com/spacecowboy/Feeder#features) y funciona bien con carpetas de fuentes RSS. -[:octicons-repo-16: Repositorio](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribuir" } +Es compatible con [RSS](https://es.wikipedia.org/wiki/RSS), [Atom](https://es.wikipedia.org/wiki/Atom_(formato_de_redifusi%C3%B3n)), [RDF](https://es.wikipedia.org/wiki/RDF/XML) y [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } +[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" }
Downloads "Descargas" @@ -85,12 +87,14 @@ Un **agregador de noticias** es un programa informático que reúne contenidos d ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** es un agregador de noticias basado en web que puedes alojar tú mismo. Es compatible con [RSS](https://es.wikipedia.org/wiki/RSS), [Atom](https://es.wikipedia.org/wiki/Atom_(formato_de_redifusi%C3%B3n)), [RDF](https://es.wikipedia.org/wiki/RDF/XML) y [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** es un agregador de noticias basado en web que puedes alojar tú mismo. -[:octicons-home-16: Página Principal](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribuir" } +Es compatible con [RSS](https://es.wikipedia.org/wiki/RSS), [Atom](https://es.wikipedia.org/wiki/Atom_(formato_de_redifusi%C3%B3n)), [RDF](https://es.wikipedia.org/wiki/RDF/XML) y [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } +[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ Un **agregador de noticias** es un programa informático que reúne contenidos d ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS con un diseño y un conjunto de funciones nativos. Es compatible con los formatos de fuente típicos, además incluye soporte integrado para fuentes de Reddit. +**NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS con un diseño y un conjunto de funciones nativos. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Página Principal](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Política de Privacidad" } @@ -125,9 +131,9 @@ Un **agregador de noticias** es un programa informático que reúne contenidos d **Newsboat** es un lector de fuentes RSS/Atom para la consola de texto. Es una bifurcación de [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter) mantenida activamente. Es muy ligero e ideal para su uso a través de [Secure Shell](https://es.wikipedia.org/wiki/Secure_Shell). -[:octicons-home-16: Página Principal](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ Puede suscribirse a canales de YouTube sin necesidad de iniciar sesión y asocia

Ejemplo

-Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214). El código del canal se encuentra en la página "Acerca de" del canal de YouTube al que desea suscribirse, en: **Información** > **Compartir canal** > **Copiar ID de canal**. Sustituya `[[CHANNEL ID]` a continuación: +Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Sustituya `[[CHANNEL ID]` a continuación: ```text https://youtube.com/feeds/videos.xml?channel_id=[[CHANNEL ID] diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index 5fdd826c..0fd13714 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -1,7 +1,7 @@ --- title: "Blocs de Notas" icon: material/notebook-edit-outline -description: Estas aplicaciones encriptadas para tomar notas te permiten hacer un seguimiento de tus apuntes sin cedérselos a terceros. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft OneNote, te sugerimos que elijas aquí una alternativa que soporte [Cifrado de extremo a extremo (E2EE)](https://es.wikipedia.org/wiki/Cifrado_de_extremo_a_extremo). +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Basado en la nube @@ -19,18 +19,20 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O
-![Logotipo de Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** es una aplicación de notas simple y privada que hace que tus notas sean fáciles y estén disponibles dondequiera que estés. Ofrece E2EE en todas las plataformas y una potente experiencia de escritorio con temas y editores personalizados. Además ha sido [auditada de forma independiente](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Ofrece E2EE en todas las plataformas y una potente experiencia de escritorio con temas y editores personalizados. -[:octicons-home-16: Página Principal](https://standardnotes.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuir } +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). + +[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes) - [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450) @@ -38,7 +40,7 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,16 +54,18 @@ Standard Notes [se ha unido a Proton AG](https://standardnotes.com/blog/joining- ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** es una aplicación gratuita y de código abierto para tomar notas, centrada en la privacidad del usuario y la facilidad de uso. Ofrece cifrado de extremo a extremo en todas las plataformas con una potente sincronización para tomar tus notas sobre la marcha. Puedes importar fácilmente tus notas desde Evernote, OneNote y muchas otras aplicaciones utilizando su [importador oficial](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. -[:octicons-home-16: Página Principal](https://notesnook.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribuir } +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). + +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) - [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) @@ -69,10 +73,10 @@ Standard Notes [se ha unido a Proton AG](https://standardnotes.com/blog/joining- - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,16 +88,18 @@ Standard Notes [se ha unido a Proton AG](https://standardnotes.com/blog/joining- ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Ofrece encriptación de extremo a extremo y puede sincronizar a través de Nextcloud, Dropbox y más. También ofrece una fácil importación desde Evernote y notas en texto plano. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. -[:octicons-home-16: Página Principal](https://joplinapp.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribuir } +It can sync through Nextcloud, Dropbox, and more. También ofrece una fácil importación desde Evernote y notas en texto plano. + +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) - [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) @@ -102,13 +108,13 @@ Standard Notes [se ha unido a Proton AG](https://standardnotes.com/blog/joining- - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin no [admite](https://github.com/laurent22/joplin/issues/289) protección por contraseña/PIN para la misma apliación o para notas y cuadernos individuales. Sin embargo, tus datos están encriptados en tránsito y en la ubicación de sincronización utilizando tu clave maestra. Desde enero de 2023, Joplin [admite bloqueo biométrico](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) en Android e iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Sin embargo, tus datos están encriptados en tránsito y en la ubicación de sincronización utilizando tu clave maestra. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin no [admite](https://github.com/laurent22/joplin/issues/289) protección p ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** es un editor de documentos E2EE de código abierto basado en web y una aplicación de almacenamiento de fotos. Cryptee es una PWA, lo que significa que funciona perfectamente en todos los dispositivos modernos sin necesidad de aplicaciones nativas para cada plataforma. +**Cryptee** es un editor de documentos E2EE de código abierto basado en web y una aplicación de almacenamiento de fotos. -[:octicons-home-16: Página Principal](https://crypt.ee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Código Fuente" } +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. + +[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. La inscripción no requiere correo electrónico ni otros datos personales. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Blocs de Notas Locales @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** es un [modo principal](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) para GNU Emacs. Org-mode sirve para tomar notas, mantener listas de tareas pendientes, planificar proyectos y crear documentos con un sistema de texto plano rápido y eficaz. La sincronización es posible con las herramientas [sincronización de archivos](file-sharing.md#file-sync). +**Org-mode** es un [modo principal](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) para GNU Emacs. Org-mode sirve para tomar notas, mantener listas de tareas pendientes, planificar proyectos y crear documentos con un sistema de texto plano rápido y eficaz. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Página Principal](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentación} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/es/office-suites.md b/i18n/es/office-suites.md index 40b91d32..0a56b025 100644 --- a/i18n/es/office-suites.md +++ b/i18n/es/office-suites.md @@ -26,7 +26,7 @@ Elige una **suite de ofimática** que no requiera iniciar sesión para acceder a [:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribuir }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) - [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) @@ -53,7 +53,7 @@ Elige una **suite de ofimática** que no requiera iniciar sesión para acceder a :octicons-code-16:{ .card-link title="Código fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index ac742c55..5f133fc0 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -128,14 +128,14 @@ schema: **Los administradores de contraseñas** permiten almacenar y gestionar de forma segura contraseñas y otras credenciales con el uso de una contraseña maestra. -[Introducción a las Contraseñas :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introducción a las Contraseñas :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Detalles

Los administradores de contraseñas integrados en programas como navegadores y sistemas operativos a veces no son tan buenos como los programas de administración de contraseñas específicos. La ventaja de un administrador de contraseñas integrado es la buena integración con el software, pero a menudo puede ser muy simple y carecer de las funciones de privacidad y seguridad que tienen las ofertas independientes. -Por ejemplo, el administrador de contraseñas de Microsoft Edge no ofrece E2EE. El gestor de contraseñas de Google tiene E2EE [opcional](https://support.google.com/accounts/answer/11350823), y [el de Apple](https://support.apple.com/HT202303) ofrece E2EE por defecto. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. El gestor de contraseñas de Google tiene E2EE [opcional](https://support.google.com/accounts/answer/11350823), y [el de Apple](https://support.apple.com/HT202303) ofrece E2EE por defecto.
@@ -167,15 +167,15 @@ Estos administradores de contraseñas sincronizan sus contraseñas con un servid - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden utiliza [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) como algoritmo de función de derivación de claves (KDF) por defecto. También ofrece como alternativa [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), que es más seguro. Puede cambiar el algoritmo KDF de su cuenta en el almacén web. +Bitwarden utiliza [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) como algoritmo de función de derivación de claves (KDF) por defecto. También ofrece como alternativa [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), que es más seguro. You can change your account's KDF algorithm in the web vault: - [x] Seleccione **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -201,14 +201,14 @@ El código del lado del servidor de Bitwarden es de [código abierto](https://gi [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,14 +229,16 @@ Todos los problemas se abordaron y solucionaron poco después del [informe](http ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso que te permite almacenar contraseñas, llaves de acceso, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Tu bóveda se aloja en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up). 1Password es [auditada](https://support.1password.com/security-assessments) con regularidad y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso que te permite almacenar contraseñas, llaves de acceso, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Tu bóveda se aloja en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up). + +1Password es [auditada](https://support.1password.com/security-assessments) con regularidad y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Página Principal](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Política de Privacidad" } [:octicons-info-16:](https://support.1password.com){ .card-link title="Documentación" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) @@ -244,16 +246,16 @@ Todos los problemas se abordaron y solucionaron poco después del [informe](http - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Tradicionalmente, 1Password ha ofrecido la mejor experiencia de usuario entre los administradores de contraseñas para las personas que utilizan macOS e iOS; sin embargo, ahora ha logrado la paridad de características en todas las plataformas. Los clientes de 1Password cuentan con muchas características orientadas a las familias y a las personas menos técnicas, como una interfaz de usuario intuitiva para facilitar el uso y la navegación, así como funcionalidades avanzadas. En particular, casi todas las funciones de 1Password están disponibles en sus clientes nativos para móvil o escritorio. +Tradicionalmente, 1Password ha ofrecido la mejor experiencia de usuario entre los administradores de contraseñas para las personas que utilizan macOS e iOS; sin embargo, ahora ha logrado la paridad de características en todas las plataformas. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. En particular, casi todas las funciones de 1Password están disponibles en sus clientes nativos para móvil o escritorio. Su bóveda de 1Password está protegida tanto con su contraseña maestra como con una clave de seguridad aleatoria de 34 caracteres para cifrar sus datos en los servidores. Esta clave de seguridad añade una capa de protección a sus datos, ya que estos están asegurados con una alta entropía independientemente de su contraseña maestra. Muchas otras soluciones de administración de contraseñas dependen totalmente de la fortaleza de su contraseña maestra para proteger sus datos. @@ -271,12 +273,12 @@ Su bóveda de 1Password está protegida tanto con su contraseña maestra como co [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -325,14 +327,14 @@ Estas opciones le permiten administrar una base de datos de contraseñas cifrada [:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribuir" }
-Downloads "Descargas" +Downloads - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,12 +348,12 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. La [versión pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) de la aplicación permite desbloquear contenidos cosméticos y funciones de protocolo no estándar, pero lo más importante es que ayuda y fomenta el desarrollo. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. -[:octicons-home-16: Página Principal](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribuir" } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads "Descargas" @@ -363,6 +365,8 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki ### Criterios -**Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted. +**Por favor, ten en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. - Debe ser multiplataforma. diff --git a/i18n/es/pastebins.md b/i18n/es/pastebins.md index f57cdd05..97ccf178 100644 --- a/i18n/es/pastebins.md +++ b/i18n/es/pastebins.md @@ -17,12 +17,12 @@ Los [**Pastebins**](https://es.wikipedia.org/wiki/Pastebin) son servicios en lí ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** es un pastebin en línea minimalista y de código abierto en el que el servidor no tiene ningún conocimiento de los datos pegados. Los datos se cifran/descifran en el navegador utilizando AES de 256 bits. Es la versión mejorada de ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Los datos se cifran/descifran en el navegador utilizando AES de 256 bits. Es la versión mejorada de ZeroBin. -[:octicons-home-16: Página Principal](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -44,16 +44,16 @@ Los [**Pastebins**](https://es.wikipedia.org/wiki/Pastebin) son servicios en lí ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. ### Requisitos Mínimos - Debe ser de código abierto. -- Debe implementar el cifrado de extremo a extremo de "confianza cero". +- Must implement "zero-trust" E2EE. - Debe admitir archivos protegidos por contraseña. ### Mejor Caso Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. -- Debe tener una auditoría publicada por una tercera parte independiente y de buena reputación. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/es/photo-management.md b/i18n/es/photo-management.md index b01c8237..0f26c12e 100644 --- a/i18n/es/photo-management.md +++ b/i18n/es/photo-management.md @@ -1,7 +1,7 @@ --- title: Gestión de Fotografías icon: material/image -description: Herramientas de gestión de fotos para mantener tus fotos personales a salvo de las miradas indiscretas de los proveedores de almacenamiento en la nube y de otros accesos no autorizados. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,30 +18,32 @@ La mayoría de las soluciones de **gestión de fotografías en la nube**, como G ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** es un servicio de copia de seguridad cifrada de fotos de extremo a extremo que admite copias de seguridad automáticas en iOS y Android. Su código es totalmente abierto, tanto en el lado del cliente como en el del servidor. También es [autoalojable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** es un servicio de copia de seguridad cifrada de fotos de extremo a extremo que admite copias de seguridad automáticas en iOS y Android. Their code is fully open source, both on the client side and on the server side. También es [autoalojable](https://github.com/ente-io/ente/tree/main/server#self-hosting). -[:octicons-home-16: Página Principal](https://ente.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Código Fuente" } +The free plan offers 5 GB of storage as long as you use the service at least once a year. + +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
-Ente Photos se sometió a una [auditoría por Cure53](https://ente.io/blog/cryptography-audit) en marzo de 2023 y por [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) en abril de 2023. +Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. ## Stingle @@ -50,18 +52,19 @@ Ente Photos se sometió a una [auditoría por Cure53](https://ente.io/blog/crypt ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** es una aplicación de galería y cámara con funciones integradas de copia de seguridad cifrada de extremo a extremo y de sincronización para tus fotos y vídeos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. -[:octicons-home-16: Página Principal](https://stingle.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/stingle){ .card-link title="Código Fuente" } +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. + +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -75,15 +78,15 @@ Ente Photos se sometió a una [auditoría por Cure53](https://ente.io/blog/crypt ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Permite sincronizar y compartir álbumes y tiene otras muchas [funciones](https://photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Página Principal](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -93,11 +96,11 @@ Ente Photos se sometió a una [auditoría por Cure53](https://ente.io/blog/crypt ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. ### Requisitos Mínimos -- Los proveedores alojados en la nube deben aplicar cifrado de extremo a extremo. +- Cloud-hosted providers must enforce E2EE. - Debe ofrecer un plan gratuito o un periodo de prueba. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Debe ofrecer una interfaz web que admita funciones básicas de gestión de archivos. @@ -106,4 +109,4 @@ Ente Photos se sometió a una [auditoría por Cure53](https://ente.io/blog/crypt ### Mejor Caso -- Debe tener una auditoría publicada por una tercera parte independiente y de buena reputación. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/es/privacy.md b/i18n/es/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/es/privacy.md +++ b/i18n/es/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index adb8e90f..c4408992 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Servicios de Mensajería Cifrados diff --git a/i18n/es/social-networks.md b/i18n/es/social-networks.md index d17beba1..b01f54cc 100644 --- a/i18n/es/social-networks.md +++ b/i18n/es/social-networks.md @@ -189,7 +189,7 @@ With this setting enabled, unverified users (i.e., those who have not used the * ## Criterios -**Por favor, ten en cuenta que no estamos afiliados a ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Sugerimos que te familiarices con esta lista, antes de decidir utilizar un proyecto y realizar tu propia investigación para asegurarte de que es la elección ideal para ti. - Must be free and open-source software. - Must use a federated protocol to communicate with other instances of the social networking software. diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 4b145f70..0c04e733 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -355,7 +355,7 @@ Si busca más **seguridad**, asegúrese siempre de conectarse a sitios web que u
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 98f0eddb..6453b515 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -31,7 +31,7 @@ schema: **Tor** es un grupo de servidores operados por voluntarios que te permiten conectarte gratuitamente, además de mejorar tu privacidad y seguridad en Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Consejo

@@ -42,7 +42,7 @@ Antes de conectarte a Tor, por favor, asegúrate de haber leído nuestro [resume Hay varias formas de conectarse a la red Tor desde tu dispositivo, la más utilizada es el **Tor Browser**, un fork de Firefox diseñado para la navegación [:material-incognito: anónima](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} para ordenadores de sobremesa y Android. -Algunas de estas aplicaciones son mejores que otras y, una vez más, la decisión depende de tu modelo de amenazas. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Aumentar el número de personas que usan Tor a diario ayuda a reducir el mal estigma de Tor, y disminuye la calidad de las "listas de usuarios de Tor" que los ISP y los gobiernos pueden compilar. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Aumentar el número de personas que usan Tor a diario ayuda a reducir el mal estigma de Tor, y disminuye la calidad de las "listas de usuarios de Tor" que los ISP y los gobiernos pueden compilar. Si un anonimato más completo es primordial para tu situación, deberías **solo** usar el cliente de escritorio de Tor Browser, idealmente en una configuración [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ Si un anonimato más completo es primordial para tu situación, deberías **solo
-![Logo del Navegador Tor](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** es la elección si necesitas anonimato, ya que te proporciona acceso a la red de Tor y puentes, e incluye ajustes por defecto y extensiones que estan configuradas automáticamente a los niveles de seguridad por defecto: *Estándar*, *Más seguro* y *Más seguro de todos*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Página Principal](https://torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentación } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads "Descargas" @@ -80,7 +80,7 @@ Si un anonimato más completo es primordial para tu situación, deberías **solo
-El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu identificación debido a la configuración de tu navegador. Por lo tanto, es imperativo que **no** modifiques el navegador más allá de los [niveles de seguridad](https://tb-manual.torproject.org/security-settings) predeterminados. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu identificación debido a la configuración de tu navegador. Por lo tanto, es imperativo que **no** modifiques el navegador más allá de los [niveles de seguridad](https://tb-manual.torproject.org/security-settings) predeterminados. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Además de instalar Tor Browser en tu ordenador directamente, también hay sistemas operativos diseñados específicamente para conectarse a la red Tor como [Whonix](desktop.md#whonix) en [Qubes OS](desktop.md#qubes-os), que proporcionan incluso mayor seguridad y protecciones que el Navegador Tor estándar por sí solo. @@ -90,13 +90,15 @@ Además de instalar Tor Browser en tu ordenador directamente, también hay siste ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** es un navegador de código abierto que te permite navegar por la web de forma anónima a través de la red Tor en dispositivos iOS y está respaldado por el [Proyecto Tor](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** es un navegador de código abierto que te permite navegar por la web de forma anónima a través de la red Tor en dispositivos iOS y está respaldado por el [Proyecto Tor](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads "Descargas" diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 26afaac7..39f08370 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -144,11 +144,12 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/fa/about/donation-acceptance-policy.md b/i18n/fa/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/fa/about/donation-acceptance-policy.md +++ b/i18n/fa/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/fa/advanced/communication-network-types.md b/i18n/fa/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/fa/advanced/communication-network-types.md +++ b/i18n/fa/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/fa/advanced/tor-overview.md b/i18n/fa/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/fa/advanced/tor-overview.md +++ b/i18n/fa/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/fa/ai-chat.md b/i18n/fa/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/fa/ai-chat.md +++ b/i18n/fa/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/fa/alternative-networks.md b/i18n/fa/alternative-networks.md index f1d6a429..393c0209 100644 --- a/i18n/fa/alternative-networks.md +++ b/i18n/fa/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/fa/android/general-apps.md b/i18n/fa/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/fa/android/general-apps.md +++ b/i18n/fa/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/fa/basics/vpn-overview.md b/i18n/fa/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/fa/basics/vpn-overview.md +++ b/i18n/fa/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/fa/basics/why-privacy-matters.md +++ b/i18n/fa/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md index 818c00dc..aff3500a 100644 --- a/i18n/fa/desktop-browsers.md +++ b/i18n/fa/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 64592e48..50675a81 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/fa/dns.md b/i18n/fa/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/fa/dns.md +++ b/i18n/fa/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/fa/document-collaboration.md b/i18n/fa/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/fa/document-collaboration.md +++ b/i18n/fa/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/fa/health-and-wellness.md b/i18n/fa/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/fa/health-and-wellness.md +++ b/i18n/fa/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/fa/index.md b/i18n/fa/index.md index db1a7c2e..d8a0ceb1 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/fa/language-tools.md b/i18n/fa/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/fa/language-tools.md +++ b/i18n/fa/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/fa/maps.md b/i18n/fa/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/fa/maps.md +++ b/i18n/fa/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/fa/meta/admonitions.md b/i18n/fa/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/fa/meta/admonitions.md +++ b/i18n/fa/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/fa/news-aggregators.md b/i18n/fa/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/fa/news-aggregators.md +++ b/i18n/fa/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index 3ce1d785..9c3af366 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -اگر در حال حاضر از برنامه‌ای مانند Evernote، Google Keep یا Microsoft OneNote استفاده می‌کنید، پیشنهاد می‌کنیم یک جایگزین را در اینجا انتخاب کنید که از E2EE پشتیبانی می‌کند. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## بر پایه ابری @@ -19,13 +19,17 @@ Keep track of your notes and journals without giving them to a third party.
-**Standard Notes** یک برنامه یادداشت ساده و خصوصی است که یادداشت های شما را در هر جایی که هستید آسان و در دسترس می کند. دارای E2EE در هر پلتفرم و تجربه قدرتمند دسکتاپ با تم ها و ویرایشگرهای سفارشی است. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } + +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. دارای E2EE در هر پلتفرم و تجربه قدرتمند دسکتاپ با تم ها و ویرایشگرهای سفارشی است. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -36,7 +40,7 @@ Keep track of your notes and journals without giving them to a third party. - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -50,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -67,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -82,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -100,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -115,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -141,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/fa/pastebins.md b/i18n/fa/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/fa/pastebins.md +++ b/i18n/fa/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/fa/photo-management.md b/i18n/fa/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/fa/photo-management.md +++ b/i18n/fa/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/fa/privacy.md b/i18n/fa/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/fa/privacy.md +++ b/i18n/fa/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index 066e3259..4509d63f 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 02e8d6e1..688d9d5d 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[مشاهده جزئیات کامل Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: ویدیو: چرا به Tor نیاز دارید](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

نکته

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- راه‌های مختلفی برای اتصال به شبکه Tor از دستگاه شما وجود دارد که رایج‌ترین آن **مرورگر Tor** است، یک انشعاب از فایرفاکس که برای [:material-incognito: گشت‌وگذار ناشناس](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} در رایانه‌های رومیزی و اندروید طراحی شده است. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
دانلود @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. علاوه بر نصب مستقیم مرورگر Tor روی رایانه شما، سیستم‌عامل‌هایی نیز وجود دارند که به طور خاص برای اتصال به شبکه Tor طراحی شده‌اند، مانند [Whonix](desktop.md#whonix) روی [Qubes OS](desktop.md#qubes-os)، که امنیت و محافظت‌های بیشتری نسبت به مرورگر Tor به تنهایی ارائه می‌دهند. @@ -90,13 +90,15 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
دانلود diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index 3ba27dbf..29cdfa8a 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/fr/about/donation-acceptance-policy.md b/i18n/fr/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/fr/about/donation-acceptance-policy.md +++ b/i18n/fr/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/fr/advanced/communication-network-types.md b/i18n/fr/advanced/communication-network-types.md index 8f839882..07fb24cc 100644 --- a/i18n/fr/advanced/communication-network-types.md +++ b/i18n/fr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Une présentation de plusieurs architectures réseau couramment uti Il existe plusieurs architectures réseau couramment utilisées pour relayer des messages entre des personnes. Ces réseaux peuvent offrir des garanties différentes en matière de protection de la vie privée. C'est pourquoi il est utile de tenir compte de votre [modèle de menace](../basics/threat-modeling.md) lorsque vous décidez quelle application à utiliser. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Réseaux Centralisés diff --git a/i18n/fr/advanced/tor-overview.md b/i18n/fr/advanced/tor-overview.md index c652df48..b3676e6e 100644 --- a/i18n/fr/advanced/tor-overview.md +++ b/i18n/fr/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor est un réseau décentralisé, gratuit, conçu pour utiliser In [**Tor**](../alternative-networks.md#tor) est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor fonctionne en acheminant votre trafic Internet via des serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. [:octicons-home-16:](https://torproject.org){ .card-link title="Page d'accueil" } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Service onion" } @@ -35,13 +35,13 @@ Parce que nous [recommandons généralement](../basics/vpn-overview.md) déjà q En vous connectant directement à Tor, vous vous distinguerez auprès des administrateurs de réseaux locaux ou de votre FAI. La détection et la corrélation de ce trafic [ont été effectuées](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) dans le passé par des administrateurs de réseau pour identifier et désanonymiser des utilisateurs spécifiques de Tor sur leur réseau. D'un autre côté, se connecter à un VPN est presque toujours moins suspect, parce que les fournisseurs de VPN commerciaux sont utilisés par les consommateurs de tous les jours pour une variété de tâches courantes telles que contourner les géo-restrictions, même dans les pays avec de lourdes restrictions d'Internet. -Par conséquent, vous devriez faire un effort pour cacher votre adresse IP **avant** de vous connecter au réseau Tor. Vous pouvez le faire simplement en vous connectant à un VPN (par le biais d'un client installé sur votre ordinateur) et en accédant à [Tor](../tor.md) comme d'habitude, par exemple via le Navigateur Tor. Cela crée une chaîne de connexion comme : +Par conséquent, vous devriez faire un effort pour cacher votre adresse IP **avant** de vous connecter au réseau Tor. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] Vous → VPN → Tor → Internet Du point de vue de votre FAI, il semble que vous accédez à un VPN normalement (avec la protection associée que cela vous fourni). Du point de vue de votre VPN, il peut voir que vous vous connectez au réseau Tor, mais rien sur les sites web auxquels vous accédez. Du point de vue de Tor, vous vous connectez normalement, mais dans le cas improbable d'une compromission du réseau Tor, seule l'IP de votre VPN serait exposée, et votre VPN devrait être compromis *également* pour vous désanonymiser. -Il ne s'agit **pas** de conseils de contournement de la censure, car si Tor est entièrement bloqué par votre FAI, votre VPN le sera probablement aussi. Cette recommandation vise plutôt à faire en sorte que votre trafic se fonde mieux dans le trafic banal des utilisateurs de VPN, et à vous fournir un certain niveau de déni plausible en masquant à votre FAI le fait que vous vous connectez à Tor. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Cette recommandation vise plutôt à faire en sorte que votre trafic se fonde mieux dans le trafic banal des utilisateurs de VPN, et à vous fournir un certain niveau de déni plausible en masquant à votre FAI le fait que vous vous connectez à Tor. --- @@ -51,7 +51,7 @@ Nous **déconseillons fortement** de combiner Tor avec un VPN de toute autre man - Vous → VPN → Tor → VPN → Internet - Toute autre configuration -Certains fournisseurs de VPN et d'autres publications recommandent parfois ces **mauvaises configurations** pour éviter les interdictions de Tor (les nœuds de sortie étant bloqués par des sites web) dans certains endroits. [Normalement](https://support.torproject.org/#about_change-paths), Tor change fréquemment le chemin de votre circuit à travers le réseau. Lorsque vous choisissez un VPN comme *destination* permanente (en vous connectant à un serveur VPN *après* Tor), vous éliminez cet avantage et nuisez considérablement à votre anonymat. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normalement](https://support.torproject.org/#about_change-paths), Tor change fréquemment le chemin de votre circuit à travers le réseau. Lorsque vous choisissez un VPN comme *destination* permanente (en vous connectant à un serveur VPN *après* Tor), vous éliminez cet avantage et nuisez considérablement à votre anonymat. Il est difficile de mettre en place de mauvaises configurations comme celles-ci par accident, parce qu'elles impliquent généralement soit la mise en place de paramètres de proxy personnalisés dans le Navigateur Tor, soit la mise en place de paramètres de proxy personnalisés dans votre client VPN qui achemine votre trafic VPN à travers le Navigateur Tor. Tant que vous évitez ces configurations autres que celles par défaut, tout va bien. @@ -60,7 +60,7 @@ Il est difficile de mettre en place de mauvaises configurations comme celles-ci

Capture d'empreinte numérique VPN/SSH

-Le Tor Project [mentionne](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) que *théoriquement* l'utilisation d'un VPN pour cacher à votre FAI les activités Tor n'est pas forcément infaillible. Les VPNs se sont révélés vulnérables à la capture d'empreinte numérique du trafic des sites web, un adversaire pouvant toujours deviner quel site web est visité, car tous les sites web ont des schémas de trafic spécifiques. +Le Tor Project [mentionne](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) que *théoriquement* l'utilisation d'un VPN pour cacher à votre FAI les activités Tor n'est pas forcément infaillible. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Il n'est donc pas déraisonnable de penser que le trafic Tor chiffré caché par un VPN pourrait également être détecté par des méthodes similaires. Il n'existe aucun document de recherche sur ce sujet, et nous considérons toujours que les avantages de l'utilisation d'un VPN l'emportent largement sur ces risques, mais il s'agit d'un élément à garder à l'esprit. @@ -68,11 +68,11 @@ Si vous pensez toujours que les transports enfichables (ponts) offrent une prote
-Pour déterminer si vous devez d'abord utiliser un VPN pour vous connecter au réseau Tor, il vous faudra faire preuve de bon sens et connaître les politiques de votre gouvernement et de votre FAI relatives à ce à quoi vous vous connectez. Cependant, encore une fois et dans la plupart des cas, il est préférable que vous soyez vu comme connecté à un réseau VPN commercial plutôt que directement au réseau Tor. Si les fournisseurs de VPN sont censurés dans votre région, vous pouvez également envisager d'utiliser des transports enfichables Tor (par exemple les ponts Snowflake ou meek) comme alternative, mais l'utilisation de ces ponts peut susciter plus de suspicion que les tunnels WireGuard/OpenVPN standard. +Pour déterminer si vous devez d'abord utiliser un VPN pour vous connecter au réseau Tor, il vous faudra faire preuve de bon sens et connaître les politiques de votre gouvernement et de votre FAI relatives à ce à quoi vous vous connectez. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## Ce que Tor n'est pas -Le réseau Tor n'est pas l'outil de protection de la vie privée idéal dans tous les cas et présente un certain nombre d'inconvénients qu'il convient d'examiner attentivement. Ces éléments ne doivent pas vous décourager d'utiliser Tor s'il est adapté à vos besoins, mais ils doivent être pris en compte lors du choix de la solution la plus appropriée pour vous. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. Ces éléments ne doivent pas vous décourager d'utiliser Tor s'il est adapté à vos besoins, mais ils doivent être pris en compte lors du choix de la solution la plus appropriée pour vous. ### Tor n'est pas un VPN gratuit @@ -80,26 +80,26 @@ La sortie de l'application mobile *Orbot* a conduit de nombreuses personnes à d Contrairement aux nœuds de sortie de Tor, les fournisseurs de VPN ne sont généralement pas *activement* [malveillants](#caveats). Les nœuds de sortie Tor pouvant être créés par n'importe qui, ils constituent des points névralgiques pour l'enregistrement et la modification du réseau. En 2020, de nombreux nœuds de sortie de Tor ont été documentés comme rétrogradant le trafic HTTPS en HTTP afin de [détourner des transactions de crypto-monnaies](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). D'autres attaques de nœuds de sortie, telles que le remplacement de téléchargements par des logiciels malveillants via des canaux non chiffrés, ont également été observées. Le protocole HTTPS atténue ces menaces dans une certaine mesure. -Comme nous l'avons déjà mentionné, Tor est également facilement identifiable sur le réseau. Contrairement à un véritable fournisseur de VPN, l'utilisation de Tor vous fera passer pour une personne qui tente probablement d'échapper aux autorités. Dans un monde parfait, Tor serait perçu par les administrateurs réseau et les autorités comme un outil aux multiples usages (comme les VPNs), mais dans la réalité, la perception de Tor est encore bien moins légitime que celle des VPNs commerciaux, de sorte que l'utilisation d'un vrai VPN vous permet d'opposer un démenti plausible, par exemple "Je l'utilisais juste pour regarder Netflix", etc. +Comme nous l'avons déjà mentionné, Tor est également facilement identifiable sur le réseau. Contrairement à un véritable fournisseur de VPN, l'utilisation de Tor vous fera passer pour une personne qui tente probablement d'échapper aux autorités. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### L'utilisation de Tor n'est pas indétectable -**Même si vous utilisez des ponts et des transports enfichables,** le Tor Project ne fournit aucun outil pour cacher à votre FAI le fait que vous utilisez Tor. Même l'utilisation de "transports enfichables" obscurcis ou de ponts non publics ne permet pas de dissimuler le fait que l'on utilise un canal de communication privé. Les transports enfichables les plus populaires comme obfs4 (qui obscurcit votre trafic pour "ne ressembler à rien") et meek (qui utilise le domain fronting pour camoufler votre trafic) peuvent être [détectés](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) avec des techniques d'analyse du trafic assez classiques. Snowflake présente des problèmes similaires et peut être [facilement détecté](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *avant* même qu'une connexion Tor ne soit établie. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Même l'utilisation de "transports enfichables" obscurcis ou de ponts non publics ne permet pas de dissimuler le fait que l'on utilise un canal de communication privé. Les transports enfichables les plus populaires comme obfs4 (qui obscurcit votre trafic pour "ne ressembler à rien") et meek (qui utilise le domain fronting pour camoufler votre trafic) peuvent être [détectés](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) avec des techniques d'analyse du trafic assez classiques. Snowflake présente des problèmes similaires et peut être [facilement détecté](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *avant* même qu'une connexion Tor ne soit établie. -Il existe des transport enfichables autres que ces trois-là, mais ils reposent généralement sur la sécurité par l'obscurité pour échapper à la détection. Ils ne sont pas impossibles à détecter, ils sont simplement utilisés par si peu de personnes que cela ne vaut pas la peine de construire des détecteurs pour eux. Il ne faut pas s'y fier si vous êtes spécifiquement surveillé. +Il existe des transport enfichables autres que ces trois-là, mais ils reposent généralement sur la sécurité par l'obscurité pour échapper à la détection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. Il ne faut pas s'y fier si vous êtes spécifiquement surveillé. Il est essentiel de comprendre la différence entre contourner la censure et échapper à la détection. Il est plus facile d'accomplir la première solution en raison des nombreuses limitations réelles de ce que les censeurs de réseau peuvent faire en masse, mais ces techniques ne cachent pas le fait que vous -*spécifiquement* - utilisez Tor à une personne intéressée qui surveille votre réseau. ### Le Navigateur Tor n'est pas le navigateur le plus *sûr* -L'anonymat est souvent en contradiction avec la sécurité : L'anonymat de Tor exige que chaque utilisateur soit identique, ce qui crée une monoculture (les mêmes bugs sont présents chez tous les utilisateurs du navigateur Tor). En matière de cybersécurité, les monocultures sont généralement considérées comme mauvaises : la sécurité par la diversité (qui fait défaut à Tor) permet une segmentation naturelle en limitant les vulnérabilités à des groupes plus restreints, et est donc généralement souhaitable, mais cette diversité est également moins bonne pour l'anonymat. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). En matière de cybersécurité, les monocultures sont généralement considérées comme mauvaises : la sécurité par la diversité (qui fait défaut à Tor) permet une segmentation naturelle en limitant les vulnérabilités à des groupes plus restreints, et est donc généralement souhaitable, mais cette diversité est également moins bonne pour l'anonymat. En outre, le Navigateur Tor est basé sur les versions Extended Support Release de Firefox, qui ne reçoivent des correctifs que pour les vulnérabilités considérées comme *Critique* et *Élevée* (et non pour celles *Moyenne* et *Faible*). Cela signifie que les attaquants pourraient (par exemple) : 1. Rechercher les nouvelles vulnérabilités Critique/Élevée dans les versions nightly ou bêta de Firefox, puis vérifier si elles sont exploitables dans le navigateur Tor (cette période de vulnérabilité peut durer des semaines). 2. Enchaîner *plusieurs * vulnérabilités Moyenne/Faible jusqu'à ce qu'ils obtiennent le niveau d'accès qu'ils recherchent (cette période de vulnérabilité peut durer des mois ou plus). -Les personnes exposées aux vulnérabilités des navigateurs devraient envisager des protections supplémentaires pour se défendre contre les exploits du Navigateur Tor, comme l'utilisation de Whonix dans [Qubes](../os/qubes-overview.md) pour contenir votre navigation Tor dans une VM sécurisée et la protéger contre les fuites. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Création de chemins vers les services de surface @@ -137,7 +137,7 @@ Le noeud de sortie sera choisi au hasard parmi tous les noeuds Tor disponibles e Les "services onion" (également communément appelés "services cachés") sont des sites web auxquels on ne peut accéder qu'au moyen du navigateur Tor. Ces sites web ont un long nom de domaine généré de manière aléatoire et se terminant par `.onion`. -La connexion à un service onion dans Tor fonctionne de manière très similaire à la connexion à un service de surface, mais votre trafic est acheminé à travers un total de **six nœuds** avant d'atteindre le serveur de destination. Cependant, comme auparavant, seuls trois de ces nœuds contribuent à *votre* anonymat, les trois autres nœuds protègent *l'anonymat du service onion*, en cachant la véritable IP et la localisation du site web de la même manière que le navigateur Tor cache les vôtres. +La connexion à un service onion dans Tor fonctionne de manière très similaire à la connexion à un service de surface, mais votre trafic est acheminé à travers un total de **six nœuds** avant d'atteindre le serveur de destination. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Chemin Tor montrant votre trafic acheminé à travers vos trois noeuds Tor plus trois noeuds Tor supplémentaires qui cachent l'identité du site web](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ La connexion à un service onion dans Tor fonctionne de manière très similaire ## Chiffrement -Tor chiffre chaque paquet (un bloc de données transmises) trois fois avec les clés du nœud de sortie, du nœud central, et du nœud d'entrée, dans cet ordre. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Une fois que Tor a construit un circuit, la transmission des données se fait comme suit: -1. Premièrement: lorsque le paquet arrive au nœud d'entrée, la première couche de chiffrement est supprimée. Dans ce paquet chiffré, le nœud d'entrée trouvera un autre paquet chiffré avec l'adresse du nœud central. Le nœud d'entrée transmet ensuite le paquet au nœud central. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. Dans ce paquet chiffré, le nœud d'entrée trouvera un autre paquet chiffré avec l'adresse du nœud central. Le nœud d'entrée transmet ensuite le paquet au nœud central. -2. Deuxièmement : lorsque le nœud central reçoit le paquet du nœud d'entrée, il supprime lui aussi une couche de chiffrement avec sa clé, et trouve cette fois un paquet chiffré avec l'adresse du nœud de sortie. Le nœud central transmet ensuite le paquet au nœud de sortie. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. Le nœud central transmet ensuite le paquet au nœud de sortie. -3. Enfin, lorsque le nœud de sortie reçoit son paquet, il supprime la dernière couche de chiffrement avec sa clé. Le nœud de sortie verra l'adresse de destination et transmettra le paquet à cette adresse. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. Le nœud de sortie verra l'adresse de destination et transmettra le paquet à cette adresse. Vous trouverez ci-dessous un autre schéma illustrant le processus. Chaque nœud supprime sa propre couche de chiffrement, et lorsque le serveur de destination renvoie les données, le même processus se déroule entièrement en sens inverse. Par exemple, le nœud de sortie ne sait pas qui vous êtes, mais il sait de quel nœud il provient. Il ajoute donc sa propre couche de chiffrement et renvoie le message. @@ -185,7 +185,7 @@ Si vous souhaitez utiliser Tor pour naviguer sur le web, nous ne recommandons qu Les ponts Tor sont généralement présentés comme une méthode alternative pour cacher l'utilisation de Tor à un FAI, au lieu d'un VPN (que nous suggérons d'utiliser si possible). Il faut savoir que si les ponts permettent de contourner la censure de manière adéquate, il ne s'agit que d'un avantage *transitoire*. Ils ne vous protègent pas de manière adéquate contre le fait que votre FAI découvre que vous vous êtes connecté à Tor dans le *passé* grâce à l'analyse historique des journaux de trafic. -Pour illustrer ce point, considérez le scénario suivant : vous vous connectez à Tor via un pont et votre FAI ne le détecte pas parce qu'il n'effectue pas d'analyse sophistiquée de votre trafic et que les choses fonctionnent donc comme prévu. Quatre mois se sont écoulés et l'IP de votre pont a été rendue publique. Il s'agit d'un phénomène très courant avec les ponts, qui sont découverts et bloqués relativement souvent, mais pas immédiatement. +Pour illustrer ce point, considérez le scénario suivant : vous vous connectez à Tor via un pont et votre FAI ne le détecte pas parce qu'il n'effectue pas d'analyse sophistiquée de votre trafic et que les choses fonctionnent donc comme prévu. Quatre mois se sont écoulés et l'IP de votre pont a été rendue publique. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Votre FAI veut identifier les utilisateurs de Tor il y a 4 mois, et avec leurs journaux de métadonnées limités, ils peuvent voir que vous vous êtes connecté à une adresse IP qui s'est révélée plus tard être un pont Tor. Vous n'avez pratiquement aucune autre excuse pour établir une telle connexion, de sorte que le FAI peut affirmer avec une très grande certitude que vous étiez un utilisateur de Tor à ce moment-là. @@ -193,7 +193,7 @@ Comparez cela à notre scénario recommandé, dans lequel vous vous connectez à Comme il est presque certain que votre FAI ne capture pas toutes les données au niveau des paquets et les stocke indéfiniment, il n'a aucun moyen de déterminer à quoi vous vous êtes connecté avec ce VPN *après* coup avec une technique avancée telle que l'inspection approfondie des paquets, et vous avez donc un déni plausible. -Par conséquent, les ponts sont les plus utiles pour contourner la censure sur Internet *dans l'immédiat*, mais elles ne remplacent pas **tous** les avantages que l'utilisation d'un VPN avec Tor peut apporter. Encore une fois, il ne s'agit pas d'un conseil *contre* l'utilisation des ponts Tor, vous devez simplement être conscient de ces limitations lorsque vous prenez votre décision. Dans certains cas, les ponts peuvent être la *seule* option (si tous les fournisseurs de VPN sont bloqués, par exemple), vous pouvez donc toujours les utiliser dans ces circonstances en gardant cette limitation à l'esprit. +Par conséquent, les ponts sont les plus utiles pour contourner la censure sur Internet *dans l'immédiat*, mais elles ne remplacent pas **tous** les avantages que l'utilisation d'un VPN avec Tor peut apporter. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. Dans certains cas, les ponts peuvent être la *seule* option (si tous les fournisseurs de VPN sont bloqués, par exemple), vous pouvez donc toujours les utiliser dans ces circonstances en gardant cette limitation à l'esprit. Si vous pensez qu'un pont peut vous aider à vous défendre contre la capture d'empreinte numérique ou d'autres analyses avancées du réseau plus que ne le fait déjà le tunnel chiffré d'un VPN, vous avez toujours la possibilité d'utiliser un pont en conjonction avec un VPN. Ainsi, vous restez protégé par les techniques d'obscurcissement du transport enfichable, même si un adversaire parvient à avoir un certain niveau de visibilité dans votre tunnel VPN. Si vous décidez de suivre cette voie, nous vous recommandons de vous connecter à un pont obfs4 derrière votre VPN pour une protection optimale contre la capture d'empreintes numériques, plutôt qu'à meek ou Snowflake. @@ -205,6 +205,6 @@ Il est [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wi - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: Le premier relais de votre circuit est appelé "garde d'entrée" ou "garde". Il s'agit d'un relais rapide et stable qui reste le premier de votre circuit pendant 2 à 3 mois afin de vous protéger contre une attaque connue de rupture d'anonymat. Le reste de votre circuit change avec chaque nouveau site web que vous visitez, et tous ensemble ces relais fournissent les protections complètes de Tor en matière de vie privée. Pour en savoir plus sur le fonctionnement des relais de garde, consultez cet [article de blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) et ce [document](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sur les gardes d'entrée. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: Le premier relais de votre circuit est appelé "garde d'entrée" ou "garde". Il s'agit d'un relais rapide et stable qui reste le premier de votre circuit pendant 2 à 3 mois afin de vous protéger contre une attaque connue de rupture d'anonymat. Le reste de votre circuit change avec chaque nouveau site web que vous visitez, et tous ensemble ces relais fournissent les protections complètes de Tor en matière de vie privée. Pour en savoir plus sur le fonctionnement des relais de garde, consultez cet [article de blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) et ce [document](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sur les gardes d'entrée. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Balise de relai: une (dis-)qualification spéciale des relais pour les positions de circuit (par exemple, "Guard", "Exit", "BadExit"), les propriétés de circuit (par exemple, "Fast", "Stable") ou les rôles (par exemple, "Authority", "HSDir"), tels qu'attribués par les autorités de l'annuaire et définis plus précisément dans la spécification du protocole de l'annuaire. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Balise de relai: une (dis-)qualification spéciale des relais pour les positions de circuit (par exemple, "Guard", "Exit", "BadExit"), les propriétés de circuit (par exemple, "Fast", "Stable") ou les rôles (par exemple, "Authority", "HSDir"), tels qu'attribués par les autorités de l'annuaire et définis plus précisément dans la spécification du protocole de l'annuaire. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/fr/ai-chat.md b/i18n/fr/ai-chat.md index 9b1d1bb1..c38c17df 100644 --- a/i18n/fr/ai-chat.md +++ b/i18n/fr/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,13 +67,13 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
-Téléchargements +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases) - [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases) @@ -108,7 +108,7 @@ In addition to supporting a wide range of text models, Ollama also supports [LLa [:octicons-lock-16:](https://github.com/ollama/ollama/blob/a14f76491d694b2f5a0dec6473514b7f93beeea0/SECURITY.md){ .card-link title="Security Policy" }
-Téléchargements +Downloads - [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows) - [:simple-apple: macOS](https://ollama.com/download/mac) @@ -124,19 +124,19 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
-Téléchargements +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart) - [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart) diff --git a/i18n/fr/alternative-networks.md b/i18n/fr/alternative-networks.md index ce053ec4..a95253fa 100644 --- a/i18n/fr/alternative-networks.md +++ b/i18n/fr/alternative-networks.md @@ -59,7 +59,7 @@ Vous pouvez essayer de vous connecter à _Privacy Guides_ via Tor à [xoe4vn5uwd [:octicons-heart-16:](https://orbot.app/donate){ .card-link title="Contribute" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) @@ -129,7 +129,7 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or [:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribuer }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) - [:simple-android: Android](https://geti2p.net/en/download#android) @@ -154,5 +154,6 @@ En outre, contrairement à Tor, chaque nœud I2P relaiera par défaut le trafic L'approche de I2P présente toutefois des inconvénients. Le fait que Tor s'appuie sur des nœuds de sortie dédiés signifie que davantage de personnes dans des environnements moins sûrs peuvent l'utiliser, et les relais qui existent sur Tor sont susceptibles d'être plus performants et plus stables, car ils ne sont généralement pas exécutés sur des connexions résidentielles. Tor est également beaucoup plus axé sur la **confidentialité du navigateur** (c'est-à-dire empêcher la capture d'empreintes numériques), avec un [Navigateur Tor](tor.md) dédié pour rendre l'activité de navigation aussi anonyme que possible. I2P est utilisé via votre [navigateur web ordinaire](desktop-browsers.md), et bien que vous puissiez configurer votre navigateur pour mieux protéger votre vie privée, vous n'aurez probablement pas la même empreinte numérique de navigateur que les autres utilisateurs de I2P (il n'y a pas de "foule" à laquelle se fondre à cet égard). +Tor est susceptible de mieux résister à la censure, en raison de son solide réseau de ponts et de divers [transports enfichables] (https://tb-manual.torproject.org/circumvention). D'autre part, l'I2P utilise des serveurs d'annuaire pour la connexion initiale, qui varient, ne sont pas fiables et sont gérés par des bénévoles, alors que Tor utilise des serveurs codés en dur et fiables, qui sont probablement plus faciles à bloquer. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor est susceptible de mieux résister à la censure, en raison de son solide réseau de ponts et de divers [transports enfichables] (https://tb-manual.torproject.org/circumvention). D'autre part, l'I2P utilise des serveurs d'annuaire pour la connexion initiale, qui varient, ne sont pas fiables et sont gérés par des bénévoles, alors que Tor utilise des serveurs codés en dur et fiables, qui sont probablement plus faciles à bloquer. diff --git a/i18n/fr/android/general-apps.md b/i18n/fr/android/general-apps.md index 01cfde6f..54374951 100644 --- a/i18n/fr/android/general-apps.md +++ b/i18n/fr/android/general-apps.md @@ -70,13 +70,13 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases) @@ -116,12 +116,12 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases) diff --git a/i18n/fr/android/obtaining-apps.md b/i18n/fr/android/obtaining-apps.md index 2b36b641..34682f20 100644 --- a/i18n/fr/android/obtaining-apps.md +++ b/i18n/fr/android/obtaining-apps.md @@ -19,7 +19,7 @@ Il existe de nombreuses façons d'obtenir des applications Android en privé, m [:octicons-heart-16:](https://github.com/sponsors/ImranR98){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases) @@ -48,7 +48,7 @@ The Google Play Store requires a Google account to log in, which is not great fo [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases) diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index d1fa123a..74d374d8 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Les réseaux privés virtuels déplacent le risque de votre FAI à Les Réseaux Privés Virtuels sont un moyen d'étendre l'extrémité de votre réseau avec une sortie située ailleurs dans le monde. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normalement, un FAI peut voir le flux de trafic internet qui entre et sort de votre dispositif de terminaison de réseau (c'est-à-dire votre box/modem). Les protocoles de chiffrement tels que HTTPS sont couramment utilisés sur internet, ils se peut donc qu'ils ne soient pas en mesure de voir exactement ce que vous publiez ou lisez, mais ils peuvent avoir une idée [des domaines que vous visitez](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md index ee8de615..d23b03be 100644 --- a/i18n/fr/basics/why-privacy-matters.md +++ b/i18n/fr/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ La protection de la vie privée concerne en fin de compte des informations humai De nombreuses personnes confondent les concepts de **vie privée**, **sécurité**, et **anonymat**. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Confidentialité** @@ -58,7 +58,7 @@ Prenons l'exemple des formulaires de consentement des cookies. Vous les rencontr La protection de la vie privée doit être intégrée par défaut dans les [logiciels et services](../tools.md) que nous utilisons, car il est impossible de forcer de vous-même la plupart des applications à respecter votre vie privée. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/fr/browser-extensions.md b/i18n/fr/browser-extensions.md index e28e9ef5..dfbfbd50 100644 --- a/i18n/fr/browser-extensions.md +++ b/i18n/fr/browser-extensions.md @@ -31,7 +31,7 @@ Don't install extensions which you don't immediately have a need for, or ones th [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) @@ -68,7 +68,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh) @@ -100,7 +100,7 @@ We recommend [Safari](mobile-browsers.md#safari-ios) for iOS users, which unfort [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Code source" }
-Téléchargements +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162) diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 57954b0e..f3ba9f6e 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Attaques passives](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Fournisseurs de service](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. Les alternatives énumérées ci-dessous éliminent le besoin de confiance en mettant en œuvre un E2EE sécurisé. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Si ces alternatives ne répondent pas à vos besoins, nous vous suggérons d'utiliser un logiciel de chiffrement tel que [Cryptomator](encryption.md#cryptomator-cloud) avec un autre fournisseur de cloud. L'utilisation de Cryptomator en conjonction avec **tout** fournisseur de cloud (y compris ceux-ci) peut être une bonne idée pour réduire le risque de failles de chiffrement dans les clients natifs d'un fournisseur. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a -Tresorit a fait l'objet d'un certain nombre d'audits de sécurité indépendants : +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Tresorit a fait l'objet d'un certain nombre d'audits de sécurité indépendants - Computest a découvert deux vulnérabilités qui ont été résolues. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Cette étude a analysé le code source complet de Tresorit et validé que la mise en œuvre correspond aux concepts décrits dans le [livre blanc](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) de Tresorit. - - Ernst & Young a également testé les clients web, mobiles et de bureau : "Les résultats des tests n'ont révélé aucun écart par rapport aux affirmations de Tresorit en matière de confidentialité des données". + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Exigences minimales -- Doit imposer le chiffrement de bout en bout. +- Must enforce E2EE. - Doit avoir une offre gratuite ou une période d'essai pour les tests. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Doit offrir une interface web prennant en charge les fonctionnalités de base de gestion des fichiers. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. - Les clients devraient être open source. -- Les clients devraient être audités dans leur intégralité par un tiers indépendant. +- Clients should be audited in their entirety by an independent third party. - Devrait offrir des clients natifs pour Linux, Android, Windows, macOS et iOS. - Ces clients devraient s'intégrer aux outils natifs du système d'exploitation pour les fournisseurs de stockage cloud, comme l'intégration de l'application Fichiers sur iOS, ou la fonctionnalité DocumentsProvider sur Android. -- Devrait permettre de partager facilement des fichiers avec d'autres utilisateurs. +- Should support easy file sharing with other users. - Devrait offrir au moins une fonctionnalité de base d'aperçu et d'édition de fichiers sur l'interface web. [^1]: La conformité à la norme [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 concerne le [système de gestion de la sécurité de l'information](https://en.wikipedia.org/wiki/Information_security_management) de l'entreprise et couvre la vente, le développement, la maintenance et le soutien de ses services cloud. diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 7bddd850..b74d5013 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -32,9 +32,9 @@ Vous ne devez **jamais** utiliser le flou pour expurger [du texte dans les image [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Code Source" }
-Téléchargements +Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,11 +51,11 @@ Vous ne devez **jamais** utiliser le flou pour expurger [du texte dans les image **ExifEraser** est une application moderne d'effacement des métadonnées d'image sans autorisation pour Android. -Il prend actuellement en charge les fichiers JPEG, PNG et WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Dépôt](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Code Source" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
Téléchargements diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index fb9d743a..410b3a02 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -91,7 +91,7 @@ Le **navigateur Mullvad** est une version du [navigateur Tor](tor.md#tor-browser Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la capture d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index cb6e81c4..64e25156 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -24,8 +24,8 @@ Les distributions Linux sont généralement recommandées pour la protection de **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora adapte généralement les nouvelles technologies (p. ex. [Wayland](https://wayland.freedesktop.org) et [PireWire](https://pipewire.org)) avant les autres distributions. Ces nouvelles technologies s'accompagnent souvent d'améliorations générales en matière de sécurité, de vie privée et d'ergonomie. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora a un cycle de publication semi-continu. While some packages like the desk openSUSE Tumbleweed utilise [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) pour s'assurer que le système peut être restauré à une version précédente en cas de problème. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed suit un modèle de publication continu où chaque mise à jour est pu **Arch Linux** est une distribution légère et do-it-yourself (DIY), ce qui veut dire que vous n'obtenez que ce que vous installez. Pour plus d'informations, voir leur [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions_(Fran%C3%A7ais)). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ Une grande portion des [packages d'Arch Linux](https://reproducible.archlinux.or **Fedora Atomic Desktops** sont des variantes de Fedora qui utilisent le gestionnaire de paquets `rpm-ostree` et qui sont fortement axées sur les flux de travail conteneurisés et Flatpak pour les applications de bureau. Toutes ces variantes suivent le même calendrier de publication que Fedora Workstation, bénéficiant des mêmes mises à jour rapides et restant très proches de l'original. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS est une distribution indépendante basée sur le gestionnaire de paquets Nix avec un accent sur la reproductibilité et la fiabilité. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paq [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** est un système d'exploitation autonome basé sur Debian qui fait passer toutes les communications par Tor, et qui peut démarrer sur presque n'importe quel ordinateur à partir d'un DVD, d'une clé USB ou d'une installation sur carte SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ De par sa conception, Tails est censé se réinitialiser complètement après ch [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/fr/device-integrity.md b/i18n/fr/device-integrity.md index e9f3237d..a5e3a295 100644 --- a/i18n/fr/device-integrity.md +++ b/i18n/fr/device-integrity.md @@ -78,7 +78,7 @@ Le **Mobile Verification Toolkit** (**MVT**) est une collection d'utilitaires qu [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) - [:simple-linux: Linux](https://docs.mvt.re/en/latest/install) @@ -121,7 +121,7 @@ MVT vous permet d'effectuer des analyses plus approfondies si votre appareil est [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation}
-Téléchargements +Downloads - [:fontawesome-brands-windows: Windows](https://imazing.com/download) - [:simple-apple: macOS](https://imazing.com/download) @@ -164,7 +164,7 @@ L'utilisation de ces applications ne suffit pas à déterminer qu'un appareil es [:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribuer }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases) diff --git a/i18n/fr/dns.md b/i18n/fr/dns.md index 8ca61e45..bd924219 100644 --- a/i18n/fr/dns.md +++ b/i18n/fr/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Un logiciel de proxy DNS chiffré fourni un proxy local vers lequel le résolveu [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/fr/document-collaboration.md b/i18n/fr/document-collaboration.md index 6659bb1a..9e4b1b6b 100644 --- a/i18n/fr/document-collaboration.md +++ b/i18n/fr/document-collaboration.md @@ -28,7 +28,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribuer }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) @@ -54,7 +54,7 @@ Nous ne recommandons pas l'utilisation de [l'application E2EE](https://apps.next ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/fr/email-aliasing.md b/i18n/fr/email-aliasing.md index 2735fb4f..b653e968 100644 --- a/i18n/fr/email-aliasing.md +++ b/i18n/fr/email-aliasing.md @@ -65,7 +65,7 @@ L'utilisation d'un service d'alias nécessite de faire confiance à la fois à v [:octicons-heart-16:](https://addy.io/donate){ .card-link title="Contribute" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://addy.io/faq/#is-there-an-android-app) - [:simple-appstore: App Store](https://addy.io/faq/#is-there-an-ios-app) @@ -106,7 +106,7 @@ If you cancel your subscription, you will still enjoy the features of your paid [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 9fc2d1c2..168fe0e3 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** est un outil de chiffrement léger et simple qui fournit un chiffrement moderne. Picocrypt utilise le chiffrement sécurisé XChaCha20 et la fonction de dérivation de clé Argon2id pour assurer un haut niveau de sécurité. Il utilise les modules x/crypto standards de Go pour ses fonctions de chiffrement. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** est la méthode de chiffrement de disque par défaut pour Linux. Elle peut être utilisée pour chiffrer des volumes complets, des partitions ou créer des conteneurs chiffrés. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/fr/health-and-wellness.md b/i18n/fr/health-and-wellness.md index b4257ff6..1b1f3274 100644 --- a/i18n/fr/health-and-wellness.md +++ b/i18n/fr/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/fr/index.md b/i18n/fr/index.md index ca02c104..22b1b09e 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -114,6 +114,6 @@ Nous recommandons une grande variété d'**outils de confidentialité** (a.k.a. De nombreuses personnes confondent les notions de vie privée, de sécurité et d'anonymat. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/fr/language-tools.md b/i18n/fr/language-tools.md index bc6448bc..694e6c1b 100644 --- a/i18n/fr/language-tools.md +++ b/i18n/fr/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,17 +23,17 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1534275760) - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/fr/maps.md b/i18n/fr/maps.md index 51026ac8..f3460efa 100644 --- a/i18n/fr/maps.md +++ b/i18n/fr/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd propose une intégration optionnelle de Street View via [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Critères @@ -84,4 +86,4 @@ Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet - Apps should be open source. - Should have route planning for public transport. - Should have real-time traffic information for route planning. -- Devrait proposer des fonctionnalités avancées comme des informations détaillées et avis sur des magasins et points d'intérêts (POI) , des cartes topographiques, des cartes satellites et Street View. +- Should support advanced features such as detailed shop/point of interest (POI) information and reviews, topographic maps, and satellite and street view images. diff --git a/i18n/fr/meta/admonitions.md b/i18n/fr/meta/admonitions.md index 135c8706..33a8d7c8 100644 --- a/i18n/fr/meta/admonitions.md +++ b/i18n/fr/meta/admonitions.md @@ -3,7 +3,7 @@ title: Avertissements description: A guide for website contributors on creating admonitions. --- -**Les avertissements** (ou conseils) sont un choix que les rédacteurs peuvent utiliser pour inclure un contenu annexe dans un article sans interrompre le flux du document. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Exemple d'avertissement

@@ -41,7 +41,7 @@ TEXTE JOINT
``` -Le `TITRE` doit être spécifié, si vous ne voulez pas de titre spécifique, vous pouvez mettre le même texte que le `TYPE` (voir ci-dessous) en majuscule, par exemple `Note`. `TEXTE JOINT` doit être formaté en Markdown. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. `TEXTE JOINT` doit être formaté en Markdown. ### Types ordinaires @@ -166,11 +166,11 @@ Ce format est utilisé pour générer des cartes de recommandation. Il manque no ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,15 +189,15 @@ Ce format est utilisé pour générer des cartes de recommandation. Il manque no ![logo PhotoPrism](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. Elle prend en charge la synchronisation et le partage d'albums ainsi qu'une variété d'autres [fonctionnalités](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. Elle prend en charge la synchronisation et le partage d'albums ainsi qu'une variété d'autres [fonctionnalités](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -209,7 +209,7 @@ Ce format est utilisé pour générer des cartes de recommandation. Il manque no #### `downloads` -Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer la section des liens de téléchargement. Il n'est utilisé qu'à l'intérieur des cartes de recommandation, comme le montre l'exemple ci-dessus. +This is a special type of collapsible admonition which is used to generate sections containing download links. Il n'est utilisé qu'à l'intérieur des cartes de recommandation, comme le montre l'exemple ci-dessus. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -229,11 +229,11 @@ Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer ## Ancien format -Tout au long du site, vous verrez peut-être des avertissements formatés de manière similaire à ces exemples : +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa.
-**Ce format n'est désormais plus utilisé**, car il est incompatible avec les nouvelles versions de notre logiciel de traduction chez Crowdin. Lors de l'ajout d'une nouvelle page sur le site, seul le format HTML le plus récent doit être utilisé. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -Il n'y a pas d'urgence à convertir les avertissements de l'ancien format au nouveau format. Les pages qui utilisent actuellement ce format devraient continuer à fonctionner, mais nous les mettrons à jour pour utiliser le nouveau format HTML ci-dessus au fur et à mesure que nous continuerons à mettre le site à jour. +Il n'y a pas d'urgence à convertir les avertissements de l'ancien format au nouveau format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/fr/news-aggregators.md b/i18n/fr/news-aggregators.md index dc7ac2fd..6ce243f6 100644 --- a/i18n/fr/news-aggregators.md +++ b/i18n/fr/news-aggregators.md @@ -42,10 +42,10 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). Il possède une fonction de recherche et une liste prédéfinie de sources qui peuvent être ajoutées directement. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). Il possède une fonction de recherche et une liste prédéfinie de sources qui peuvent être ajoutées directement. -[:octicons-repo-16: Dépôt](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Code source" } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
Téléchargements @@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Logo de Feeder](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** est un client RSS moderne sur Android qui possède de nombreuses [fonctionnalités](https://github.com/spacecowboy/Feeder#features) et fonctionne bien avec des dossiers de flux RSS. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** est un client RSS moderne sur Android qui possède de nombreuses [fonctionnalités](https://github.com/spacecowboy/Feeder#features) et fonctionne bien avec des dossiers de flux RSS. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Logo de Miniflux](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Logo de Miniflux](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** est un agrégateur de flux en ligne que vous pouvez auto-héberger. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** est un agrégateur de flux en ligne que vous pouvez auto-héberger. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Il prend en charge les formats de flux habituels, ainsi que les flux Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** est un lecteur de flux RSS/Atom pour les consoles texte. C'est un fork activement maintenu de [Newsbeuter](https://fr.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-Pour s'abonner à une chaîne YouTube avec un client RSS, cherchez d'abord son [code de chaîne](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +Pour s'abonner à une chaîne YouTube avec un client RSS, cherchez d'abord son [code de chaîne](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index 54df174a..f4c9ac09 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -1,7 +1,7 @@ --- title: "Prise de notes" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Si vous utilisez actuellement une application comme Evernote, Google Keep, ou Microsoft OneNote, nous vous suggérons de choisir ici une alternative qui supporte le E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Basé sur le cloud @@ -19,15 +19,17 @@ Si vous utilisez actuellement une application comme Evernote, Google Keep, ou Mi
-![Logo de Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -Standard Notes est une application de notes simple et privée qui rend vos prises de notes faciles et disponibles partout où vous êtes. Il propose E2EE sur toutes les plateformes et une expérience de bureau puissante avec des thèmes et des éditeurs personnalisés. Il a également fait l'objet d'un [audit indépendant](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Il propose E2EE sur toutes les plateformes et une expérience de bureau puissante avec des thèmes et des éditeurs personnalisés. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Standard Notes est une application de notes simple et privée qui rend vos prise - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Elle propose un chiffrement de bout en bout sur toutes les plateformes et une synchronisation puissante pour prendre vos notes en déplacement. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Il offre E2EE et peut se synchroniser via Nextcloud, Dropbox, et plus encore. Il permet également d'importer facilement des notes d'Evernote et des notes en texte brut. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Il permet également d'importer facilement des notes d'Evernote et des notes en texte brut. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin ne [prend pas en charge](https://github.com/laurent22/joplin/issues/289) la protection par mot de passe/PIN de l'application elle-même ou des notes et carnets individuels. Les données sont toujours chiffrées en transit et à l'emplacement de la synchronisation à l'aide de votre clé principale. Depuis Janvier 2023, Joplin [prend en charge le verrouillage biométrique](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) de l'application sur Android et iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Les données sont toujours chiffrées en transit et à l'emplacement de la synchronisation à l'aide de votre clé principale. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin ne [prend pas en charge](https://github.com/laurent22/joplin/issues/289) ![Logo Cryptee](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Logo Cryptee](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** est un éditeur de documents E2EE et une application de stockage de photos à code source ouvert, basés sur le web. Cryptee est une PWA, ce qui signifie qu'elle fonctionne de manière transparente sur tous les appareils modernes sans nécessiter d'applications natives pour chaque plate-forme respective. +**Cryptee** est un éditeur de documents E2EE et une application de stockage de photos à code source ouvert, basés sur le web. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. L'inscription ne nécessite pas d'e-mail ou d'autres informations permettant d'identifier la personne. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Blocs-notes locaux @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode permet de prendre des notes, de tenir à jour des listes to-do, de planifier des projets et de rédiger des documents à l'aide d'un système de texte brut rapide et efficace. La synchronisation est possible avec des outils de [synchronisation de fichiers](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode permet de prendre des notes, de tenir à jour des listes to-do, de planifier des projets et de rédiger des documents à l'aide d'un système de texte brut rapide et efficace. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Page d'accueil](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Code source" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/fr/office-suites.md b/i18n/fr/office-suites.md index f9136549..9af7facd 100644 --- a/i18n/fr/office-suites.md +++ b/i18n/fr/office-suites.md @@ -26,7 +26,7 @@ Choose an **office suite** that does not require logging in to an account to acc [:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) - [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) @@ -53,7 +53,7 @@ Choose an **office suite** that does not require logging in to an account to acc :octicons-code-16:{ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index 42e12f9f..c5765fdc 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -128,14 +128,14 @@ schema: Les **gestionnaires de mots de passe** vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres identifiants à l'aide d'un mot de passe maître. -[Introduction aux mots de passe :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction aux mots de passe :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Les gestionnaires de mots de passe intégrés dans des logiciels tels que les navigateurs et les systèmes d'exploitation ne sont parfois pas aussi performants que les logiciels de gestion de mots de passe dédiés. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Par exemple, le gestionnaire de mots de passe de Microsoft Edge ne propose pas du tout E2EE. Le gestionnaire de mots de passe de Google a un chiffrement de bout en bout [optionnel](https://support.google.com/accounts/answer/11350823?hl=fr), et [celui d'Apple](https://support.apple.com/fr-fr/102651) le propose par défaut. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Le gestionnaire de mots de passe de Google a un chiffrement de bout en bout [optionnel](https://support.google.com/accounts/answer/11350823?hl=fr), et [celui d'Apple](https://support.apple.com/fr-fr/102651) le propose par défaut.
@@ -167,15 +167,15 @@ Ces gestionnaires de mots de passe synchronisent vos mots de passe sur un serveu - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Le code côté serveur de Bitwarden est [open source](https://github.com/bitward Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Votre coffre-fort 1Password est sécurisé à la fois par votre mot de passe principal et par une clé de sécurité aléatoire de 34 caractères pour chiffrer vos données sur leurs serveurs. Cette clé de sécurité ajoute une couche de protection à vos données, car celles-ci sont sécurisées par une entropie élevée, indépendamment de votre mot de passe principal. De nombreuses autres solutions de gestion des mots de passe dépendent entièrement de la force de votre mot de passe principal pour sécuriser vos données. @@ -276,7 +278,7 @@ Votre coffre-fort 1Password est sécurisé à la fois par votre mot de passe pri - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Ces options vous permettent de gérer une base de données de mots de passe chif - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/fr/pastebins.md b/i18n/fr/pastebins.md index 7f21f3de..d06a10ef 100644 --- a/i18n/fr/pastebins.md +++ b/i18n/fr/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Les données sont chiffrées/déchiffrées dans le navigateur en utilisant AES 256 bits. Il s'agit de la version améliorée de ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Les données sont chiffrées/déchiffrées dans le navigateur en utilisant AES 256 bits. Il s'agit de la version améliorée de ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Exigences minimales - Doit être open-source. -- Doit implémenter le chiffrement de bout en bout "à confiance zéro". +- Must implement "zero-trust" E2EE. - Doit prendre en charge les fichiers protégés par un mot de passe. ### Dans le meilleur des cas Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. -- Devrait disposer d'un audit publié par une tierce partie indépendante et réputée. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/fr/photo-management.md b/i18n/fr/photo-management.md index ad2b206d..b55ba343 100644 --- a/i18n/fr/photo-management.md +++ b/i18n/fr/photo-management.md @@ -1,7 +1,7 @@ --- title: Gestion des photos icon: material/image -description: Outils de gestion des photos pour protéger vos photos personnelles des regards indiscrets des fournisseurs de stockage cloud et d'autres accès non autorisés. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -83,7 +86,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Exigences minimales -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Doit avoir une offre gratuite ou une période d'essai pour les tests. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Doit offrir une interface web prennant en charge les fonctionnalités de base de gestion des fichiers. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Dans le meilleur des cas -- Devrait disposer d'un audit publié par une tierce partie indépendante et réputée. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/fr/privacy.md b/i18n/fr/privacy.md index 6d045e16..6c9a697e 100644 --- a/i18n/fr/privacy.md +++ b/i18n/fr/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index 233d5dfe..c6504a34 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Messageries instantanées chiffrées diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 31c46f80..00253fb9 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -348,7 +348,7 @@ Nous [recommandons](dns.md#recommended-providers) un certain nombre de serveurs
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index 64f27c7b..0433f46d 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -31,7 +31,7 @@ schema: **Tor** est un groupe de serveurs gérés par des bénévoles qui vous permet de vous connecter gratuitement et d'améliorer votre confidentialité et votre sécurité sur Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Avant de vous connecter à Tor, assurez-vous d'avoir lu notre [introduction](adv There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Certaines de ces applications sont meilleures que d'autres et, une fois encore, la décision dépend de votre modèle de menace. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. L'augmentation du nombre de personnes qui utilisent Tor au quotidien permet de réduire la mauvaise image de Tor et de diminuer la qualité des "listes d'utilisateurs de Tor" que les FAIs et les gouvernements peuvent compiler. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. L'augmentation du nombre de personnes qui utilisent Tor au quotidien permet de réduire la mauvaise image de Tor et de diminuer la qualité des "listes d'utilisateurs de Tor" que les FAIs et les gouvernements peuvent compiler. Si un anonymat plus complet est primordial dans votre situation, vous devriez **uniquement** utiliser le client bureau du Navigateur Tor, idéalement dans une configuration [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ Si un anonymat plus complet est primordial dans votre situation, vous devriez **
-![Logo de Tor Browser](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -Le **Navigateur Tor** est le choix idéal si vous avez besoin d'anonymat, car il vous donne accès au réseau et aux ponts Tor, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurées par les niveaux de sécurité par défaut : *Normal*, *Plus sûr* et *Le plus sûr*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Page d'accueil](https://torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Service onion" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Code source" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Vous ne devriez **jamais** installer des extensions supplémentaires sur le Navi
-Le Navigateur Tor est conçu pour empêcher la capture d'empreintes numérique, ou l'identification en fonction de la configuration de votre navigateur. Il est donc impératif de **ne pas** modifier le navigateur au-delà des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings) par défaut. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Le Navigateur Tor est conçu pour empêcher la capture d'empreintes numérique, ou l'identification en fonction de la configuration de votre navigateur. Il est donc impératif de **ne pas** modifier le navigateur au-delà des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings) par défaut. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Outre installer le Navigateur Tor sur votre ordinateur, il existe également des systèmes d'exploitation conçus spécifiquement pour se connecter au réseau Tor tels que [Whonix](desktop.md#whonix) sur [Qubes OS](desktop.md#qubes-os), qui offrent une sécurité et des protections encore plus importantes que le Navigateur Tor standard. @@ -90,13 +90,15 @@ Outre installer le Navigateur Tor sur votre ordinateur, il existe également des ![logo Navigateur Onion](assets/img/self-contained-networks/onion_browser.svg){ align=right } -Le **Navigateur Onion** est un navigateur open-source qui vous permet de naviguer anonymement sur le web via le réseau Tor sur les appareils iOS et qui est soutenu par le [Projet Tor](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +Le **Navigateur Onion** est un navigateur open-source qui vous permet de naviguer anonymement sur le web via le réseau Tor sur les appareils iOS et qui est soutenu par le [Projet Tor](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Téléchargements diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index a1a58cc3..75cdee17 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/he/about/donation-acceptance-policy.md b/i18n/he/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/he/about/donation-acceptance-policy.md +++ b/i18n/he/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/he/advanced/communication-network-types.md b/i18n/he/advanced/communication-network-types.md index 39e0855f..fb7d5758 100644 --- a/i18n/he/advanced/communication-network-types.md +++ b/i18n/he/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת ישנן מספר ארכיטקטורות רשת הנפוצות להעברת הודעות בין אנשים. רשתות אלו יכולות לספק הבטחות פרטיות שונות, וזו הסיבה שכדאי לקחת בחשבון את [מודל האיום](../basics/threat-modeling.md) שלך בעת ההחלטה באיזו אפליקציה להשתמש. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## רשתות מרכזיות diff --git a/i18n/he/advanced/tor-overview.md b/i18n/he/advanced/tor-overview.md index aa93fbee..dcbe4ed3 100644 --- a/i18n/he/advanced/tor-overview.md +++ b/i18n/he/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor היא רשת מבוזרת בחינם לשימוש המיועד [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## בניית נתיב לשירותי Clearnet @@ -137,7 +137,7 @@ Those at risk of browser vulnerabilities should consider additional protections "שירותי בצל" (המכונה בדרך כלל "שירותים נסתרים") הם אתרים שניתן לגשת אליהם רק על ידי דפדפן Tor. לאתרים אלה יש שם דומיין ארוך שנוצר באקראי המסתיים ב-`.onion`. -התחברות לשירות Onion ב-Tor עובד בצורה דומה מאוד לחיבור לשירות clearnet, אבל התעבורה שלך מנותבת דרך סך של **שישה** צמתים לפני שהיא מגיעה לשרת היעד. עם זאת, בדיוק כמו בעבר, רק שלושה מהצמתים הללו תורמים לאנונימיות *שלך*, שלושת הצמתים האחרים מגינים על *שירות הבצל* אנונימיות, הסתרת ה-IP והמיקום האמיתיים של האתר באותו אופן שבו דפדפן Tor מסתיר את שלך. +התחברות לשירות Onion ב-Tor עובד בצורה דומה מאוד לחיבור לשירות clearnet, אבל התעבורה שלך מנותבת דרך סך של **שישה** צמתים לפני שהיא מגיעה לשרת היעד. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![נתיב Tor המראה את התנועה שלך מנותבת דרך שלושת צמתי ה-Tor שלך בתוספת שלושה צמתי Tor נוספים המסתירים את זהות האתר](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Those at risk of browser vulnerabilities should consider additional protections ## הצפנה -Tor מצפין כל חבילה (גוש של נתונים משודרים) שלוש פעמים עם המפתחות מצומת היציאה, האמצע והכניסה - בסדר הזה. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. לאחר ש-Tor בנה מעגל, העברת הנתונים מתבצעת באופן הבא: -1. ראשית: כאשר החבילה מגיעה לצומת הכניסה, השכבה הראשונה של ההצפנה מוסרת. בחבילה מוצפנת זו, צומת הכניסה ימצא חבילה מוצפנת נוספת עם כתובת הצומת האמצעית. לאחר מכן צומת הכניסה יעביר את החבילה לצומת האמצעי. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. בחבילה מוצפנת זו, צומת הכניסה ימצא חבילה מוצפנת נוספת עם כתובת הצומת האמצעית. לאחר מכן צומת הכניסה יעביר את החבילה לצומת האמצעי. -2. שנית: כאשר הצומת האמצעי מקבל את החבילה מצומת הכניסה, גם הוא יסיר שכבת הצפנה עם המפתח שלו, והפעם ימצא חבילה מוצפנת עם כתובת צומת היציאה. הצומת האמצעי יעביר את החבילה לצומת היציאה. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. הצומת האמצעי יעביר את החבילה לצומת היציאה. -3. לבסוף: כאשר צומת היציאה יקבל את החבילה שלו, הוא יסיר את שכבת ההצפנה האחרונה עם המפתח שלו. צומת היציאה יראה את כתובת היעד ויעביר את החבילה לכתובת זו. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. צומת היציאה יראה את כתובת היעד ויעביר את החבילה לכתובת זו. להלן תרשים חלופי המציג את התהליך. כל צומת מסיר את שכבת ההצפנה שלו, וכאשר שרת היעד מחזיר נתונים, אותו תהליך קורה לגמרי הפוך. למשל, צומת היציאה לא יודע מי אתה, אבל הוא כן יודע מאיזה צומת הוא הגיע, ולכן הוא מוסיף שכבת הצפנה משלו ושולח אותו בחזרה. @@ -185,7 +185,7 @@ Tor מאפשר לנו להתחבר לשרת מבלי שאף גורם אחד יד Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: הממסר הראשון במעגל שלך נקרא "שומר כניסה" או "שומר". זהו ממסר מהיר ויציב שנשאר הראשון במעגל שלך למשך 2-3 חודשים על מנת להגן מפני התקפה ידועה לשבירת אנונימיות. שאר המעגל שלך משתנה עם כל אתר חדש שאתה מבקר בו, וכולם ביחד מספקים ממסרים אלה את הגנת הפרטיות המלאה של Tor. לקבלת מידע נוסף על אופן הפעולה של ממסרי מגן, עיין במאמר זה [בלוג פוסט](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) וגם [דף](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) על שומרי כניסה. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: הממסר הראשון במעגל שלך נקרא "שומר כניסה" או "שומר". זהו ממסר מהיר ויציב שנשאר הראשון במעגל שלך למשך 2-3 חודשים על מנת להגן מפני התקפה ידועה לשבירת אנונימיות. שאר המעגל שלך משתנה עם כל אתר חדש שאתה מבקר בו, וכולם ביחד מספקים ממסרים אלה את הגנת הפרטיות המלאה של Tor. לקבלת מידע נוסף על אופן הפעולה של ממסרי מגן, עיין במאמר זה [בלוג פוסט](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) וגם [דף](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) על שומרי כניסה. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: דגל ממסר: (אי)-הסמכה מיוחדת של ממסרים עבור עמדות מעגל (לדוגמה, "שומר", "יציאה", "יציאה-גרועה"), מאפייני מעגל (לדוגמה, "מהיר", "יציב"), או תפקידים (לדוגמה, "רשות", "HSDir"), כפי שהוקצו על ידי רשויות המדריכים ומוגדרים יותר במפרט פרוטוקול הספרייה. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: דגל ממסר: (אי)-הסמכה מיוחדת של ממסרים עבור עמדות מעגל (לדוגמה, "שומר", "יציאה", "יציאה-גרועה"), מאפייני מעגל (לדוגמה, "מהיר", "יציב"), או תפקידים (לדוגמה, "רשות", "HSDir"), כפי שהוקצו על ידי רשויות המדריכים ומוגדרים יותר במפרט פרוטוקול הספרייה. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/he/ai-chat.md b/i18n/he/ai-chat.md index 37694bdb..e507d1ab 100644 --- a/i18n/he/ai-chat.md +++ b/i18n/he/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/he/alternative-networks.md b/i18n/he/alternative-networks.md index 6ee4004f..a8b53073 100644 --- a/i18n/he/alternative-networks.md +++ b/i18n/he/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/he/android/general-apps.md b/i18n/he/android/general-apps.md index 4dc19187..3c02426a 100644 --- a/i18n/he/android/general-apps.md +++ b/i18n/he/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md index f024280e..9b583189 100644 --- a/i18n/he/basics/vpn-overview.md +++ b/i18n/he/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p רשתות וירטואליות פרטיות הן דרך להרחיב את הקצה של הרשת שלך ליציאה למקום אחר בעולם. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} בדרך כלל, ספק שירותי אינטרנט יכול לראות את זרימת תעבורת האינטרנט הנכנסת ויוצאת ממכשיר סיום הרשת שלך (כלומר מודם). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md index 855f9d10..f768905b 100644 --- a/i18n/he/basics/why-privacy-matters.md +++ b/i18n/he/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: בעידן המודרני של ניצול נתונים דיגיטל אנשים רבים מבלבלים את המושגים של פרטיות, אבטחה ואנונימיות. אנשים רבים מבלבלים את המושגים של **פרטיות**, **אבטחה** ו**אנונימיות**. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **פרטיות** @@ -58,7 +58,7 @@ description: בעידן המודרני של ניצול נתונים דיגיטל פרטיות היא משהו שאנחנו צריכים להכניס ל[תוכנות ובשירותים](../tools.md) שבהם אנו משתמשים כברירת מחדל, אתה לא יכול לכופף את רוב האפליקציות להיות פרטיות בעצמך. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## מקורות diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 6037600d..120de47f 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: התקפות פסיביות](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: ספקי שירות](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. החלופות המפורטות להלן מבטלות את הצורך באמון על ידי הטמעת E2EE מאובטחת. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. אם חלופות אלה אינן מתאימות לצרכים שלך, אנו מציעים לך לבדוק שימוש בתוכנת הצפנה כמו [Cryptomator](encryption.md#cryptomator-cloud) עם ספק ענן אחר. שימוש ב-Cryptomator בשילוב עם **כל** ספק ענן (כולל אלה) עשוי להיות רעיון טוב כדי להפחית את הסיכון לפגמי הצפנה אצל הלקוחות המקומיים של הספק. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
-Tresorit קיבלה מספר ביקורות אבטחה עצמאיות: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Tresorit קיבלה מספר ביקורות אבטחה עצמאיות: - Computest גילתה שתי נקודות תורפה שנפתרו. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - סקירה זו ניתחה את קוד המקור המלא של Tresorit ואימתה שהיישום תואם את המושגים המתוארים ב[דף הלבן](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) של Tresorit. - - ארנסט & יאנג בדק בנוסף את האינטרנט, הנייד והמחשב שולחני: "תוצאות הבדיקה לא מצאו חריגה מתביעות סודיות הנתונים של Tresorit." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### דרישות מינימליות -- חייב לאכוף הצפנה מקצה לקצה. +- Must enforce E2EE. - יש להציע תוכנית חינם או תקופת ניסיון לבדיקה. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - חייב להציע ממשק אינטרנט התומך בפונקציונליות ניהול קבצים בסיסית. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. - Clients should be open source. -- לקוחות צריכים להיות מבוקרים במלואם על ידי צד שלישי עצמאי. +- Clients should be audited in their entirety by an independent third party. - צריך להציע ללקוחות מקומיים עבור לינוקס, אנדרואיד, Windows, macOS ו - iOS. - לקוחות אלה צריכים להשתלב עם כלי מערכת הפעלה מקוריים עבור ספקי אחסון בענן, כגון שילוב אפליקציות קבצים ב- iOS, או פונקציונליות DocumentsProvider באנדרואיד. -- צריך לתמוך בשיתוף קבצים קל עם משתמשים אחרים. +- Should support easy file sharing with other users. - אמור להציע לפחות תצוגה מקדימה בסיסית של קובץ ופונקציונליות עריכה בממשק האינטרנט. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001): תאימות 2013 מתייחסת ל[מערכת ניהול אבטחת המידע](https://en.wikipedia.org/wiki/Information_security_management) של החברה ומכסה את המכירות, הפיתוח, התחזוקה והתמיכה של שירותי הענן שלהם. diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 23aa5707..b5a25fe5 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -34,7 +34,7 @@ cover: data-redaction.webp
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ cover: data-redaction.webp **ExifEraser** הוא יישום מודרני למחיקת מטא נתונים של תמונות ללא הרשאה עבור אנדרואיד. -בשלב זה הוא תומך בקבצי JPEG, PNG ו - WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md index 39d3deff..8c0a0aac 100644 --- a/i18n/he/desktop-browsers.md +++ b/i18n/he/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. אם אתה רוצה להגדיר את הדפדפן שלך בצורה כבדה יותר וטביעת אצבע אינה מדאיגה אותך, אנו ממליצים במקום זאת על [Firefox](#firefox). diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index 4dd0b201..643e1f25 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -24,8 +24,8 @@ cover: desktop.webp **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. טכנולוגיות חדשות אלה מגיעות לעתים קרובות עם שיפורים באבטחה, בפרטיות ובשימושיות באופן כללי. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora comes in two primary desktop editions, [Fedora Workstation](https://fedor openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed עוקב אחר מודל מהדורה מתגלגל שבו כל עדכ **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. לקבלת מידע נוסף, עיין ב[FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS היא הפצה עצמאית המבוססת על מנהל החבילות של Nix ומתמקדת בשחזור ואמינות. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** היא מערכת הפעלה חיה המבוססת על דביאן המנתבת את כל התקשורת דרך Tor, שיכולה לאתחל כמעט כל מחשב מ - DVD, מקל USB או התקנת כרטיס SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/he/dns.md b/i18n/he/dns.md index 42ae6183..17eb9118 100644 --- a/i18n/he/dns.md +++ b/i18n/he/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/he/document-collaboration.md b/i18n/he/document-collaboration.md index fa511aab..5619b7d9 100644 --- a/i18n/he/document-collaboration.md +++ b/i18n/he/document-collaboration.md @@ -54,7 +54,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index e6f5fdbb..c6e4878e 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** הוא כלי הצפנה קטן ופשוט המספק הצפנה מודרנית. Picocrypt משתמש בצופן המאובטח XChaCha20 ובפונקציית גזירת מפתח Argon2id כדי לספק רמת אבטחה גבוהה. הוא משתמש במודולי x/crypto הסטנדרטיים של Go עבור תכונות ההצפנה שלו. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** היא שיטת ברירת המחדל של FDE עבור לינוקס. ניתן להשתמש בו כדי להצפין אמצעי אחסון מלאים, מחיצות או ליצור מיכלים מוצפנים. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/he/health-and-wellness.md b/i18n/he/health-and-wellness.md index a797052e..fad29597 100644 --- a/i18n/he/health-and-wellness.md +++ b/i18n/he/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/he/index.md b/i18n/he/index.md index ad976179..3385fc60 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. אתה תראה אנשים מבקרים מוצרים שונים כ"לא פרטיים" כאשר הם באמת מתכוונים שזה לא מספק אנונימיות, למשל. באתר זה אנו מכסים את כל שלושת הנושאים הללו, אך חשוב שתבינו את ההבדל ביניהם, ומתי כל אחד מהם נכנס לפעולה. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/he/language-tools.md b/i18n/he/language-tools.md index 1babf3ee..aec09ff1 100644 --- a/i18n/he/language-tools.md +++ b/i18n/he/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/he/maps.md b/i18n/he/maps.md index 7cfe14f4..db278d95 100644 --- a/i18n/he/maps.md +++ b/i18n/he/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## קריטריונים diff --git a/i18n/he/meta/admonitions.md b/i18n/he/meta/admonitions.md index 27f7f6f3..680db6b6 100644 --- a/i18n/he/meta/admonitions.md +++ b/i18n/he/meta/admonitions.md @@ -3,7 +3,7 @@ title: אזהרות description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/he/news-aggregators.md b/i18n/he/news-aggregators.md index ebeb442b..081733c4 100644 --- a/i18n/he/news-aggregators.md +++ b/i18n/he/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. הוא תומך בפורמטי ההזנה האופייניים לצד תמיכה מובנית בפיד טוויטר ו-Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** הוא קורא הזנת RSS/Atom עבור קונסולת הטקסט. זהו נגזר מתוחזק באופן פעיל של [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-כדי להירשם לערוץ יוטיוב עם לקוח RSS, חפש תחילה את [קוד הערוץ] שלו (https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +כדי להירשם לערוץ יוטיוב עם לקוח RSS, חפש תחילה את [קוד הערוץ] שלו (https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index 023629c2..06ccdd89 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -1,7 +1,7 @@ --- title: "פנקס רשימות" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -אם אתה משתמש כעת באפליקציה כמו Evernote, Google Keep או Microsoft OneNote, אנו מציעים שתבחר כאן חלופה שתומכת ב-E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## מבוסס ענן @@ -19,15 +19,17 @@ Keep track of your notes and journals without giving them to a third party.
-![Standard Notes לוגו](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** היא אפליקציית הערות פשוטה ופרטית שהופכת את ההערות שלך לקלות וזמינות בכל מקום שבו אתה נמצא. הוא כולל E2EE בכל פלטפורמה, וחוויית שולחן עבודה רבת עוצמה עם ערכות עיצוב ואפשריות עריכה מותאמים אישית. זה גם עבר [ביקורת עצמאית](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. הוא כולל E2EE בכל פלטפורמה, וחוויית שולחן עבודה רבת עוצמה עם ערכות עיצוב ואפשריות עריכה מותאמים אישית. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Keep track of your notes and journals without giving them to a third party. - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. הוא כולל הצפנה מקצה לקצה בכל הפלטפורמות עם סנכרון רב עוצמה כדי לרשום את ההערות שלך תוך כדי תנועה. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. הוא מציע E2EE ויכול לסנכרן דרך Nextcloud, Dropbox ועוד. הוא מציע גם ייבוא קל מ-Evernote והערות בטקסט רגיל. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. הוא מציע גם ייבוא קל מ-Evernote והערות בטקסט רגיל. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. עם זאת, הנתונים שלך עדיין מוצפנים במעבר ובמיקום הסנכרון באמצעות מפתח הראשי שלך. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. עם זאת, הנתונים שלך עדיין מוצפנים במעבר ובמיקום הסנכרון באמצעות מפתח הראשי שלך. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee לוגו](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee לוגו](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** הוא קוד פתוח מבוסס אינטרנט E2EE עורך מסמכים ויישום אחסון תמונות. Cryptee הוא PWA, מה שאומר שהוא עובד בצורה חלקה בכל המכשירים המודרניים מבלי לדרוש אפליקציות מקוריות עבור כל פלטפורמה בהתאמה. +**Cryptee** הוא קוד פתוח מבוסס אינטרנט E2EE עורך מסמכים ויישום אחסון תמונות. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. ההרשמה אינה דורשת דואר אלקטרוני או מידע מזהה אישי אחר. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## מחברות מקומיות @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. מצב ארגוני מיועד לשמירת הערות, שמירה על רשימות מטלות, תכנון פרויקטים וכתיבת מסמכים עם מערכת טקסט רגיל מהירה ויעילה. סינכרון אפשרי באמצעות הכלי [file synchronization](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. מצב ארגוני מיועד לשמירת הערות, שמירה על רשימות מטלות, תכנון פרויקטים וכתיבת מסמכים עם מערכת טקסט רגיל מהירה ויעילה. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: דף הבית](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=תיעוד} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index 3b4908fd..dc95b432 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[מבוא לסיסמאות :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[מבוא לסיסמאות :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

מנהלי סיסמאות מובנים בתוכנות כמו דפדפנים ומערכות הפעלה אינם טובים לפעמים כמו תוכנות ייעודיות למנהל סיסמאות. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -לדוגמה, מנהל הסיסמאות ב-Microsoft Edge אינו מציע E2EE כלל. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ schema: - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. כספת 1Password שלך מאובטחת גם עם סיסמת האב שלך וגם עם מפתח אבטחה אקראי בן 34 תווים כדי להצפין את הנתונים שלך בשרתים שלהם. מפתח אבטחה זה מוסיף שכבת הגנה לנתונים שלך מכיוון שהנתונים שלך מאובטחים באנטרופיה גבוהה ללא קשר לסיסמת המאסטר שלך. פתרונות רבים אחרים של מנהל סיסמאות תלויים לחלוטין בחוזקה של סיסמת המאסטר שלך כדי לאבטח את הנתונים שלך. @@ -276,7 +278,7 @@ Traditionally, 1Password has offered the best password manager user experience f - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http ### קריטריונים -**שימו לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל[קריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו מערכת ברורה של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. +**שים לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל [הקריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו סט ברור של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. - חייב להיות חוצה פלטפורמות. diff --git a/i18n/he/pastebins.md b/i18n/he/pastebins.md index ee041c87..fcf10a50 100644 --- a/i18n/he/pastebins.md +++ b/i18n/he/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. הנתונים מוצפנים/מפוענים בדפדפן באמצעות 256 סיביות AES. זוהי הגרסה המשופרת של ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. הנתונים מוצפנים/מפוענים בדפדפן באמצעות 256 סיביות AES. זוהי הגרסה המשופרת של ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### דרישות מינימליות - חייב להיות קוד פתוח. -- חייב ליישם הצפנה "אפס אמון" מקצה לקצה. +- Must implement "zero-trust" E2EE. - חייב לתמוך בקבצים המוגנים בסיסמה. ### המקרה הטוב ביותר הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. -- צריך לפרסם ביקורת מצד שלישי מכובד ובלתי תלוי. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/he/photo-management.md b/i18n/he/photo-management.md index 6a523182..57aadfd9 100644 --- a/i18n/he/photo-management.md +++ b/i18n/he/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### דרישות מינימליות -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - יש להציע תוכנית חינם או תקופת ניסיון לבדיקה. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - חייב להציע ממשק אינטרנט התומך בפונקציונליות ניהול קבצים בסיסית. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### המקרה הטוב ביותר -- צריך לפרסם ביקורת מצד שלישי מכובד ובלתי תלוי. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/he/privacy.md b/i18n/he/privacy.md index 04ae60dc..27a9fc14 100644 --- a/i18n/he/privacy.md +++ b/i18n/he/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index b61d8639..c214ce06 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## מסנג'רים מוצפנים diff --git a/i18n/he/tools.md b/i18n/he/tools.md index 3d10f031..ce3d6e91 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/he/tor.md b/i18n/he/tor.md index 338ea421..343ab618 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Tor Browser לוגו](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**דפדפן Tor** הוא הבחירה אם אתה זקוק לאנונימיות, מכיוון שהוא מספק לך גישה לרשת Tor ולגשרים, והוא כולל הגדרות ברירת מחדל והרחבות המוגדרות אוטומטית לפי רמות האבטחה המוגדרות כברירת מחדל: *סטנדרטי*, *בטוח יותר * ו*הבטוח ביותר*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ If more complete anonymity is paramount to your situation, you should **only** b
-דפדפן Tor נועד למנוע טביעת אצבע, או לזהות אותך על סמך תצורת הדפדפן שלך. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +דפדפן Tor נועד למנוע טביעת אצבע, או לזהות אותך על סמך תצורת הדפדפן שלך. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index 04afe70f..fad45007 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/hi/about/donation-acceptance-policy.md b/i18n/hi/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/hi/about/donation-acceptance-policy.md +++ b/i18n/hi/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/hi/advanced/communication-network-types.md b/i18n/hi/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/hi/advanced/communication-network-types.md +++ b/i18n/hi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/hi/advanced/tor-overview.md b/i18n/hi/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/hi/advanced/tor-overview.md +++ b/i18n/hi/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/hi/ai-chat.md b/i18n/hi/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/hi/ai-chat.md +++ b/i18n/hi/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/hi/alternative-networks.md b/i18n/hi/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/hi/alternative-networks.md +++ b/i18n/hi/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/hi/android/general-apps.md b/i18n/hi/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/hi/android/general-apps.md +++ b/i18n/hi/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/hi/basics/vpn-overview.md b/i18n/hi/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/hi/basics/vpn-overview.md +++ b/i18n/hi/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/hi/basics/why-privacy-matters.md +++ b/i18n/hi/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md index a8507937..0f57cad7 100644 --- a/i18n/hi/desktop-browsers.md +++ b/i18n/hi/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 64592e48..50675a81 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/hi/dns.md b/i18n/hi/dns.md index 6bd65f96..9a878c74 100644 --- a/i18n/hi/dns.md +++ b/i18n/hi/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/hi/document-collaboration.md b/i18n/hi/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/hi/document-collaboration.md +++ b/i18n/hi/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/hi/health-and-wellness.md b/i18n/hi/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/hi/health-and-wellness.md +++ b/i18n/hi/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/hi/index.md b/i18n/hi/index.md index b181fecd..f200d7ef 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/hi/language-tools.md b/i18n/hi/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/hi/language-tools.md +++ b/i18n/hi/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/hi/maps.md b/i18n/hi/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/hi/maps.md +++ b/i18n/hi/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/hi/meta/admonitions.md b/i18n/hi/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/hi/meta/admonitions.md +++ b/i18n/hi/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/hi/news-aggregators.md b/i18n/hi/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/hi/news-aggregators.md +++ b/i18n/hi/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/hi/pastebins.md b/i18n/hi/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/hi/pastebins.md +++ b/i18n/hi/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/hi/photo-management.md b/i18n/hi/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/hi/photo-management.md +++ b/i18n/hi/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/hi/privacy.md b/i18n/hi/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/hi/privacy.md +++ b/i18n/hi/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index 3f04e880..9aacfdff 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 39e10a8e..dfe335cf 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index 779931a8..4d8c2581 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/hu/about/donation-acceptance-policy.md b/i18n/hu/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/hu/about/donation-acceptance-policy.md +++ b/i18n/hu/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/hu/about/jobs.md b/i18n/hu/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/hu/about/jobs.md +++ b/i18n/hu/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/hu/advanced/communication-network-types.md b/i18n/hu/advanced/communication-network-types.md index 24890579..fcf1f84d 100644 --- a/i18n/hu/advanced/communication-network-types.md +++ b/i18n/hu/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Azonnali üzenetküldő alkalmazások által gyakran használt kül Személyek közötti üzenetek továbbítására többféle hálózati architektúra használható. Ezek a hálózatok különböző magánéleti garanciákat nyújthatnak, ezért érdemes figyelembe venned a [védelmk modelledet](../basics/threat-modeling.md), amikor eldöntöd, hogy melyik alkalmazást fogod használni. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Központosított Hálózatok diff --git a/i18n/hu/advanced/tor-overview.md b/i18n/hu/advanced/tor-overview.md index cc52588b..07b56a49 100644 --- a/i18n/hu/advanced/tor-overview.md +++ b/i18n/hu/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. [:octicons-home-16:](https://torproject.org){ .card-link title=Honlap} [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion szolgáltatás" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/hu/ai-chat.md b/i18n/hu/ai-chat.md index aeb793b8..2e420837 100644 --- a/i18n/hu/ai-chat.md +++ b/i18n/hu/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/hu/alternative-networks.md b/i18n/hu/alternative-networks.md index 3f5d52e8..2170d171 100644 --- a/i18n/hu/alternative-networks.md +++ b/i18n/hu/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/hu/android/general-apps.md b/i18n/hu/android/general-apps.md index 9c190c78..8e5bb07d 100644 --- a/i18n/hu/android/general-apps.md +++ b/i18n/hu/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/hu/basics/vpn-overview.md b/i18n/hu/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/hu/basics/vpn-overview.md +++ b/i18n/hu/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md index ff41d36b..318543d9 100644 --- a/i18n/hu/basics/why-privacy-matters.md +++ b/i18n/hu/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ A magánélet végső soron az emberi információkról szól, és ez azért fon Sokan összekeverik az **adatvédelem**, az **adatbiztonság** és az **anonimitás** fogalmát. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Adatvédelem** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index b842ba9c..aba19e65 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Alap elvárások -- Végponttól végpontig terjedő titkosítást kell érvényesítenie. +- Must enforce E2EE. - Ingyenes csomagot vagy próbaidőszakot kell kínálnia a teszteléshez. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Olyan webes felületet kell kínálnia, amely támogat alapvető fájlkezelési funkciókat. @@ -138,13 +140,13 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Legjobb Esetben -A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy tökéletes projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. +A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. - Clients should be open source. -- A klienseket teljes egészükben független harmadik félnek kell felülvizsgálnia. +- Clients should be audited in their entirety by an independent third party. - Natív klienseket kell kínálnia Linux, Android, Windows, macOS és iOS rendszerekre. - Ezeknek a klienseknek integrálódniuk kell natív operációs rendszer eszközökkel, amik felhőtárhely szolgáltatóknak lettek létrehozva, például a Files alkalmazás integrációjával iOS-en, vagy a DocumentsProvider funkcióval Androidon. -- Támogatnia kell az egyszerű fájlmegosztást más felhasználókkal. +- Should support easy file sharing with other users. - Legalább alapvető fájlelőnézeti és szerkesztési funkciókat kell kínálnia a webes felületen. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index 878e841a..21826900 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -34,7 +34,7 @@ Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A ké
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A ké Az **ExifEraser** egy modern, engedély nélküli képmetaadat-törlő alkalmazás Androidra. -Jelenleg támogatja a JPEG, PNG és WebP fájlokat. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md index 600bd7ad..995ced90 100644 --- a/i18n/hu/desktop-browsers.md +++ b/i18n/hu/desktop-browsers.md @@ -91,7 +91,7 @@ Ha névtelenül szeretnél böngészni az interneten, használd inkább a [Tor]( Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Ha erősebben szeretné konfigurálni a böngészőjét, és az ujjlenyomatok nem jelentenek gondot az Ön számára, akkor inkább a [Firefoxot](#firefox) ajánljuk. diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index 5a5e1d7d..125d64b9 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/hu/dns.md b/i18n/hu/dns.md index 79e1fa93..b2819880 100644 --- a/i18n/hu/dns.md +++ b/i18n/hu/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Egy titkosított DNS proxy szoftver helyi proxy-t biztosít a [titkosítatlan DN [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/hu/document-collaboration.md b/i18n/hu/document-collaboration.md index 983f3229..dcdce6c4 100644 --- a/i18n/hu/document-collaboration.md +++ b/i18n/hu/document-collaboration.md @@ -54,7 +54,7 @@ Nem javasoljuk az [End-to-End titkosított applikáció](https://apps.nextcloud. ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 0c54eb50..f5405d23 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/hu/health-and-wellness.md b/i18n/hu/health-and-wellness.md index ebe00aba..a33a02ea 100644 --- a/i18n/hu/health-and-wellness.md +++ b/i18n/hu/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 8e774482..aede3ab0 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Láthatod, hogy emberek kritizálnak különböző termékeket, mint "nem privát", amikor valójában úgy értik, hogy nem biztosít anonimitást például. Ezen a weboldalon mindhárom témakörrel foglalkozunk, de fontos, hogy megértsd a köztük lévő különbséget, és hogy mikor melyik kerül a képbe. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/hu/language-tools.md b/i18n/hu/language-tools.md index df809f84..7c234b23 100644 --- a/i18n/hu/language-tools.md +++ b/i18n/hu/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/hu/maps.md b/i18n/hu/maps.md index c6e64969..3e2777c2 100644 --- a/i18n/hu/maps.md +++ b/i18n/hu/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Követelmények diff --git a/i18n/hu/meta/admonitions.md b/i18n/hu/meta/admonitions.md index bb2784e0..8f028582 100644 --- a/i18n/hu/meta/admonitions.md +++ b/i18n/hu/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/hu/news-aggregators.md b/i18n/hu/news-aggregators.md index 79ab354f..7e40d309 100644 --- a/i18n/hu/news-aggregators.md +++ b/i18n/hu/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index 92ab8e61..8efffa1a 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -1,7 +1,7 @@ --- title: "Jegyzetfüzetek" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Ha jelenleg olyan alkalmazást használsz, mint az Evernote, a Google Keep vagy a Microsoft OneNote, javasoljuk, hogy válassz egy olyan alternatívát, amely támogatja az End-to-End titksoítást. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Felhő-alapú @@ -21,13 +21,15 @@ Ha jelenleg olyan alkalmazást használsz, mint az Evernote, a Google Keep vagy ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -A **Standard Notes** egy egyszerű és privát jegyzetkezelő alkalmazás, amely megkönnyíti és elérhetővé teszi a feljegyzéseid kezelését bárhol is legyél. Minden platformon End-to-End titkosítást, valamint erőteljes asztali élményt kínál témákkal és egyedi szerkesztőkkel. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Minden platformon End-to-End titkosítást, valamint erőteljes asztali élményt kínál témákkal és egyedi szerkesztőkkel. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ A **Standard Notes** egy egyszerű és privát jegyzetkezelő alkalmazás, amely - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. End-to-End titkosítást kínál, és képes szinkronizálni a Nextcloudon, a Dropboxon és sok máson keresztül is. Evernote és nyílt szöveges jegyzetek egyszerű importálását is lehetővé teszi. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Evernote és nyílt szöveges jegyzetek egyszerű importálását is lehetővé teszi. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Ettől függetlenül az adatok szállítás közben és a szinkronizáció helyén is titkosítva lesznek a főkulcs segítségével. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Ettől függetlenül az adatok szállítás közben és a szinkronizáció helyén is titkosítva lesznek a főkulcs segítségével. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -A **Cryptee** egy nyílt forráskódú, webalapú End-to-End titkosított dokumentumszerkesztő és fotótároló alkalmazás. A Cryptee egy PWA, ami azt jelenti, hogy minden modern eszközön zökkenőmentesen működik anélkül, hogy minden egyes platformra natív alkalmazás igényelne. +A **Cryptee** egy nyílt forráskódú, webalapú End-to-End titkosított dokumentumszerkesztő és fotótároló alkalmazás. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. A regisztrációhoz nincs szükség e-mailre vagy más személyazonosításra alkalmas információra. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Helyi Jegyzetfüzetek @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Szinkronizálás a [fájlszinkronizációs](file-sharing.md#file-sync) eszközökkel lehetséges. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Honlap](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Közreműködés } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/hu/office-suites.md b/i18n/hu/office-suites.md index 8868cc12..9be28aff 100644 --- a/i18n/hu/office-suites.md +++ b/i18n/hu/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/hu/os/windows/group-policies.md b/i18n/hu/os/windows/group-policies.md index 0daf63fc..332429a1 100644 --- a/i18n/hu/os/windows/group-policies.md +++ b/i18n/hu/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index f5d8e462..9b7e4b2f 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/hu/pastebins.md b/i18n/hu/pastebins.md index d82253c8..8ba22e6b 100644 --- a/i18n/hu/pastebins.md +++ b/i18n/hu/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Az adatok titkosítása/dekódolása a böngészőben történik 256 bites AES használatával. Ez a ZeroBin továbbfejlesztett változata. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Az adatok titkosítása/dekódolása a böngészőben történik 256 bites AES használatával. Ez a ZeroBin továbbfejlesztett változata. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Alap elvárások - Nyílt forráskódúnak kell lennie. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Legjobb esetben A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/hu/photo-management.md b/i18n/hu/photo-management.md index 7c99d5fb..4d13454d 100644 --- a/i18n/hu/photo-management.md +++ b/i18n/hu/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Alap elvárások -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Ingyenes csomagot vagy próbaidőszakot kell kínálnia a teszteléshez. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Olyan webes felületet kell kínálnia, amely támogat alapvető fájlkezelési funkciókat. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Legjobb Esetben -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/hu/privacy.md b/i18n/hu/privacy.md index df65450e..03fa59e5 100644 --- a/i18n/hu/privacy.md +++ b/i18n/hu/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index 2e014831..1b198be5 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index 8d6ef6ba..27fc19e7 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index 4aa29d7e..4632c6f8 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tanács

@@ -42,7 +42,7 @@ Mielőtt csatlakoznál a Torhoz, kérjük, olvasd el az [áttekintést](advanced There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Néhány ilyen alkalmazás jobb, mint mások, a választás a fenyegetettségi szintedtől függ. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Az emberek számának növelése, akik mindennaposan használják a Tor-t, segít csökkenteni a Tor rossz hírnevét, és csökkenti az ISP-k (internetszolgáltatók) és kormányok által összeállított "Tor felhasználók listáinak" minőségét. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Az emberek számának növelése, akik mindennaposan használják a Tor-t, segít csökkenteni a Tor rossz hírnevét, és csökkenti az ISP-k (internetszolgáltatók) és kormányok által összeállított "Tor felhasználók listáinak" minőségét. Ha a teljes anonimitás a legfontosabb számodra, akkor **csak** az asztali Tor Browser klienst használd, ideális esetben egy [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) konfigurációban. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ Ha a teljes anonimitás a legfontosabb számodra, akkor **csak** az asztali Tor ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -A **Tor Böngésző** a legjobb választás, ha anonimitásra van szükséged, mivel hozzáférést biztosít a Tor-hálózathoz és a Tor-hidakhoz, valamint alapértelmezett beállításokat és bővítményeket tartalmaz, amelyek automatikusan előre beállított biztonsági szintek alapján vannak konfigurálva: *Normál*, *Biztonságosabb* és *Legbiztonságosabb*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Honlap](https://torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion szolgáltatás" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Támogatás} +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ A **Tor Böngésző** a legjobb választás, ha anonimitásra van szükséged, m
-A Tor böngészőt úgy tervezték, hogy megakadályozza az ujjlenyomatolást, vagyis a beazonosításodat a böngésző konfigurációja alapján. Ezért elengedhetetlen, hogy **ne** módosítsd a böngészőt az alapértelmezett [biztonsági szinteken](https://tb-manual.torproject.org/security-settings) túl. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +A Tor böngészőt úgy tervezték, hogy megakadályozza az ujjlenyomatolást, vagyis a beazonosításodat a böngésző konfigurációja alapján. Ezért elengedhetetlen, hogy **ne** módosítsd a böngészőt az alapértelmezett [biztonsági szinteken](https://tb-manual.torproject.org/security-settings) túl. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. A Tor Böngésző közvetlen számítógépre telepítése mellett vannak olyan operációs rendszerek is, amelyeket kifejezetten a Tor-hálózathoz való csatlakozásra terveztek, mint például a [Whonix](desktop.md#whonix) a [Qubes OS-en](desktop.md#qubes-os), amelyek még nagyobb biztonságot és védelmet nyújtanak, mint a hagyományos Tor Browser önmagában. @@ -90,13 +90,15 @@ A Tor Böngésző közvetlen számítógépre telepítése mellett vannak olyan ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -Az **Onion Browser** egy nyílt forráskódú böngésző, amely lehetővé teszi a Tor-hálózaton keresztüli anonim böngészést iOS-eszközökön, és amelyet a [Tor Project](https://support.torproject.org/glossary/onion-browser) támogat. [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +Az **Onion Browser** egy nyílt forráskódú böngésző, amely lehetővé teszi a Tor-hálózaton keresztüli anonim böngészést iOS-eszközökön, és amelyet a [Tor Project](https://support.torproject.org/glossary/onion-browser) támogat. + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Letöltés diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index 9e69550b..08b9c43b 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -145,8 +145,9 @@ Az **IVPN** egy másik prémium VPN szolgáltató, és 2009 óta vannak működ Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/id/about/donation-acceptance-policy.md b/i18n/id/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/id/about/donation-acceptance-policy.md +++ b/i18n/id/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/id/about/jobs.md b/i18n/id/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/id/about/jobs.md +++ b/i18n/id/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/id/advanced/communication-network-types.md b/i18n/id/advanced/communication-network-types.md index 30458555..1faf64de 100644 --- a/i18n/id/advanced/communication-network-types.md +++ b/i18n/id/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Ikhtisar tentang beberapa arsitektur jaringan yang biasa digunakan Ada beberapa arsitektur jaringan yang biasa digunakan untuk menyampaikan pesan antar orang. Jaringan ini dapat memberikan jaminan privasi yang berbeda, itulah sebabnya mengapa perlu mempertimbangkan [model ancaman](../basics/threat-modeling.md) Anda ketika memutuskan aplikasi mana yang akan digunakan. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Jaringan Terpusat diff --git a/i18n/id/advanced/tor-overview.md b/i18n/id/advanced/tor-overview.md index 737dc779..c72cd0e2 100644 --- a/i18n/id/advanced/tor-overview.md +++ b/i18n/id/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan, [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Membangun Jalur ke Layanan Clearnet @@ -137,7 +137,7 @@ Simpul keluar akan dipilih secara acak dari semua simpul Tor yang tersedia, yang "Layanan Onion" (juga sering disebut sebagai "layanan tersembunyi") adalah situs web yang hanya dapat diakses oleh peramban Tor. Situs web ini memiliki nama domain panjang yang dibuat secara acak yang diakhiri dengan `.onion`. -Proses penyambungan ke Layanan Onion di Tor berjalan sangat mirip dengan proses penyambungan ke layanan clearnet, tetapi lalu lintas Anda dirutekan melalui total **enam** simpul sebelum mencapai server tujuan. Namun, sama seperti sebelumnya, hanya tiga dari simpul-simpul ini yang berkontribusi pada anonimitas *Anda*, tiga simpul lainnya melindungi anonimitas *Layanan Onion*, menyembunyikan IP dan lokasi situs web yang sebenarnya dengan cara yang sama seperti Tor Browser menyembunyikan IP dan lokasi Anda. +Proses penyambungan ke Layanan Onion di Tor berjalan sangat mirip dengan proses penyambungan ke layanan clearnet, tetapi lalu lintas Anda dirutekan melalui total **enam** simpul sebelum mencapai server tujuan. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Proses penyambungan ke Layanan Onion di Tor berjalan sangat mirip dengan proses ## Enkripsi -Tor mengenkripsi setiap paket (blok data yang ditransmisikan) tiga kali dengan kunci dari simpul keluar, tengah, dan masuk—dalam urutan tersebut. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Setelah Tor berhasil membuat sirkuit, transmisi data dilakukan sebagai berikut: -1. Pertama: ketika paket tiba di simpul masuk, lapisan pertama enkripsi dihapus. Dalam paket terenkripsi ini, simpul masuk akan menemukan paket terenkripsi lain dengan alamat simpul tengah. Simpul masuk kemudian akan meneruskan paket ke simpul tengah. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. Dalam paket terenkripsi ini, simpul masuk akan menemukan paket terenkripsi lain dengan alamat simpul tengah. Simpul masuk kemudian akan meneruskan paket ke simpul tengah. -2. Kedua: ketika simpul tengah menerima paket dari simpul masuk, simpul tersebut juga akan menghapus lapisan enkripsi dengan kuncinya, dan kali ini menemukan paket terenkripsi dengan alamat simpul keluar. Simpul tengah kemudian akan meneruskan paket ke simpul keluar. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. Simpul tengah kemudian akan meneruskan paket ke simpul keluar. -3. Terakhir: ketika simpul keluar menerima paketnya, simpul ini akan menghapus lapisan enkripsi terakhir dengan kuncinya. Simpul keluar akan melihat alamat tujuan dan meneruskan paket ke alamat tersebut. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. Simpul keluar akan melihat alamat tujuan dan meneruskan paket ke alamat tersebut. Di bawah ini adalah diagram alternatif yang menunjukkan prosesnya. Setiap simpul menghapus lapisan enkripsinya sendiri, dan ketika server tujuan mengembalikan data, proses yang sama terjadi secara terbalik. Sebagai contoh, simpul keluar tidak tahu siapa Anda, tetapi tahu dari simpul mana ia berasal, sehingga ia menambahkan lapisan enkripsinya sendiri dan mengirimkannya kembali. @@ -185,7 +185,7 @@ Jika Anda ingin menggunakan Tor untuk menjelajah web, kami hanya merekomendasika Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: Relai pertama di sirkuit Anda disebut "penjaga jalan masuk" atau "penjaga". Relai ini adalah relai yang cepat dan stabil yang tetap menjadi relai pertama di sirkuit Anda selama 2-3 bulan untuk melindungi dari serangan pembobolan anonimitas yang telah diketahui. Sisa sirkuit Anda berubah dengan setiap situs web baru yang Anda kunjungi, dan secara keseluruhan relai ini memberikan perlindungan privasi penuh dari Tor. Untuk informasi lebih lanjut tentang cara kerja relai penjaga, lihat [posting blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) ini dan [makalah](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) tentang relai penjaga. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: Relai pertama di sirkuit Anda disebut "penjaga jalan masuk" atau "penjaga". Relai ini adalah relai yang cepat dan stabil yang tetap menjadi relai pertama di sirkuit Anda selama 2-3 bulan untuk melindungi dari serangan pembobolan anonimitas yang telah diketahui. Sisa sirkuit Anda berubah dengan setiap situs web baru yang Anda kunjungi, dan secara keseluruhan relai ini memberikan perlindungan privasi penuh dari Tor. Untuk informasi lebih lanjut tentang cara kerja relai penjaga, lihat [posting blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) ini dan [makalah](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) tentang relai penjaga. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/id/ai-chat.md b/i18n/id/ai-chat.md index 396bf9b1..e0c74d89 100644 --- a/i18n/id/ai-chat.md +++ b/i18n/id/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/id/alternative-networks.md b/i18n/id/alternative-networks.md index 27700bef..7aa1c645 100644 --- a/i18n/id/alternative-networks.md +++ b/i18n/id/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/id/android/general-apps.md b/i18n/id/android/general-apps.md index 800aa3a9..21d6097f 100644 --- a/i18n/id/android/general-apps.md +++ b/i18n/id/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/id/basics/vpn-overview.md b/i18n/id/basics/vpn-overview.md index 6486f16d..fad76d11 100644 --- a/i18n/id/basics/vpn-overview.md +++ b/i18n/id/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Jaringan Pribadi Virtual (VPN) mengalihkan risiko dari ISP Anda ke Jaringan Pribadi Virtual adalah cara untuk memperluas ujung jaringan Anda untuk keluar ke tempat lain di dunia. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md index fc32e0e8..311072d4 100644 --- a/i18n/id/basics/why-privacy-matters.md +++ b/i18n/id/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privasi pada dasarnya adalah tentang informasi manusia, dan ini penting karena k Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privasi** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sumber diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 6d578707..0dc1bfed 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Serangan Pasif](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Penyedia Layanan](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Persyaratan Minimum -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. - Klien sebaiknya bersumber terbuka. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index 4e1c849e..82edd393 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -34,7 +34,7 @@ Anda *"tidak boleh** menggunakan teknik blur untuk menyamarkan [teks dalam gamba
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Anda *"tidak boleh** menggunakan teknik blur untuk menyamarkan [teks dalam gamba **ExifEraser** adalah aplikasi penghapus metadata gambar modern tanpa izin untuk Android. -Saat ini mendukung file JPEG, PNG dan WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md index 1db11a9f..8bf0a156 100644 --- a/i18n/id/desktop-browsers.md +++ b/i18n/id/desktop-browsers.md @@ -91,7 +91,7 @@ Jika Anda perlu menjelajah internet secara anonim, Anda sebaiknya menggunakan [T Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Jika Anda ingin merubah pengaturan browser Anda dengan sesuai dengan keinginan Anda dan fingerprint bukan menjadi masalah bagi Anda, kami sarankan untuk menggunakan [Firefox](#firefox) sebagai gantinya. diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index 6003de1c..767af256 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/id/dns.md b/i18n/id/dns.md index 15e795c7..216ef53a 100644 --- a/i18n/id/dns.md +++ b/i18n/id/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Perangkat lunak proxy DNS terenkripsi menyediakan proxy lokal untuk [DNS tidak t [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/id/document-collaboration.md b/i18n/id/document-collaboration.md index b82680c7..2e6dea70 100644 --- a/i18n/id/document-collaboration.md +++ b/i18n/id/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index 1412e432..027e4174 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/id/health-and-wellness.md b/i18n/id/health-and-wellness.md index 9bfd0406..ec518e8b 100644 --- a/i18n/id/health-and-wellness.md +++ b/i18n/id/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/id/index.md b/i18n/id/index.md index 47985dbd..acfb4d7b 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/id/language-tools.md b/i18n/id/language-tools.md index 4e6dd237..10a688b1 100644 --- a/i18n/id/language-tools.md +++ b/i18n/id/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/id/maps.md b/i18n/id/maps.md index f27451c0..b2019ff5 100644 --- a/i18n/id/maps.md +++ b/i18n/id/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Kriteria diff --git a/i18n/id/meta/admonitions.md b/i18n/id/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/id/meta/admonitions.md +++ b/i18n/id/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/id/news-aggregators.md b/i18n/id/news-aggregators.md index 8e9d3d37..3d05bdfd 100644 --- a/i18n/id/news-aggregators.md +++ b/i18n/id/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Ini mendukung format feed yang umum di samping dukungan bawaan untuk feed Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** adalah pembaca umpan RSS/Atom untuk konsol teks. Ini adalah fork yang dipelihara secara aktif dari [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-Untuk berlangganan saluran YouTube dengan klien RSS, pertama-tama cari [kode saluran](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +Untuk berlangganan saluran YouTube dengan klien RSS, pertama-tama cari [kode saluran](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index 6906675b..d01d708a 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -1,7 +1,7 @@ --- title: "Buku Catatan" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Aplikasi berbasis cloud @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/id/office-suites.md b/i18n/id/office-suites.md index 986a5bcc..fe1547c1 100644 --- a/i18n/id/office-suites.md +++ b/i18n/id/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/id/os/windows/group-policies.md b/i18n/id/os/windows/group-policies.md index 423b19d7..e0dda15c 100644 --- a/i18n/id/os/windows/group-policies.md +++ b/i18n/id/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index 21ce02c1..15111d8e 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Pengantar Kata Sandi :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Pengantar Kata Sandi :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Pengelola kata sandi bawaan pada perangkat lunak seperti peramban dan sistem operasi terkadang tidak sebaik perangkat lunak pengelola kata sandi khusus. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Sebagai contoh, pengelola kata sandi di Microsoft Edge sama sekali tidak menawarkan E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Pengelola kata sandi ini menyinkronkan kata sandi Anda ke server cloud untuk kem - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Kode sisi server Bitwarden [bersumber terbuka](https://github.com/bitwarden/serv Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Brankas 1Password Anda diamankan dengan kata sandi utama dan kunci keamanan 34 karakter yang diacak untuk mengenkripsi data Anda di server mereka. Kunci keamanan ini menambahkan lapisan perlindungan pada data Anda karena data Anda diamankan dengan entropi yang tinggi terlepas dari kata sandi utama Anda. Banyak solusi pengelola kata sandi lainnya yang sepenuhnya bergantung pada kekuatan kata sandi utama Anda untuk mengamankan data Anda. @@ -276,7 +278,7 @@ Brankas 1Password Anda diamankan dengan kata sandi utama dan kunci keamanan 34 k - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Opsi ini memungkinkan Anda untuk mengelola basis data kata sandi terenkripsi sec - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/id/pastebins.md b/i18n/id/pastebins.md index c980a115..318f2b30 100644 --- a/i18n/id/pastebins.md +++ b/i18n/id/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Persyaratan Minimum - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Kasus Terbaik Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/id/photo-management.md b/i18n/id/photo-management.md index 8b7e00e1..a4342c76 100644 --- a/i18n/id/photo-management.md +++ b/i18n/id/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Persyaratan Minimum -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/id/privacy.md b/i18n/id/privacy.md index d2d5e33b..c629b8b2 100644 --- a/i18n/id/privacy.md +++ b/i18n/id/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index 567fbba4..734832e4 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/id/tools.md b/i18n/id/tools.md index c6461cf1..9770c213 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/id/tor.md b/i18n/id/tor.md index a31b4a91..e4fbe8d2 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Logo Tor Browser](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** adalah pilihan jika Anda membutuhkan anonimitas, dengan menyediakan akses ke jaringan dan jembatan Tor, dan termasuk pengaturan dan ekstensi bawaan yang secara otomatis dikonfigurasikan oleh tingkat keamanan bawaan: *Standar*, *Lebih Aman* dan *Paling Aman*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Anda sebaiknya **jangan pernah** memasang ekstensi tambahan apa pun pada Tor Bro
-Tor Browser dirancang untuk mencegah sidik jari, atau mengidentifikasi Anda berdasarkan konfigurasi peramban Anda. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Tor Browser dirancang untuk mencegah sidik jari, atau mengidentifikasi Anda berdasarkan konfigurasi peramban Anda. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index 25e2b718..57dee841 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/it/about/donation-acceptance-policy.md b/i18n/it/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/it/about/donation-acceptance-policy.md +++ b/i18n/it/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index 6383e368..8518902d 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Una panoramica delle diverse architetture di rete, comunemente util Esistono svariate architetture di rete, utilizzate comunemente per trasmettere messaggi tra persone. Queste reti possono fornire diverse garanzie per la privacy, per cui vale la pena considerare il tuo [modello di minaccia](../basics/threat-modeling.md), decidendo quale app utilizzare. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Reti Centralizzate diff --git a/i18n/it/advanced/tor-overview.md b/i18n/it/advanced/tor-overview.md index f3d007c3..157dda85 100644 --- a/i18n/it/advanced/tor-overview.md +++ b/i18n/it/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor è una rete decentralizzata e libera, progettata per utilizzare [**Tor**](../alternative-networks.md#tor) è una rete decentralizzata e gratuita progettata per utilizzare Internet con la massima privacy possibile. Se utilizzata adeguatamente, la rete consente navigazione e comunicazioni private e anonime. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor funziona instradando il traffico tramite questi server gestiti da volontari, invece di effettuare una connessione diretta al sito che stai provando a visitare. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servizio Onion" } @@ -35,13 +35,13 @@ Poiché abbiamo già [raccomandato in generale](../basics/vpn-overview.md) che l Collegandosi direttamente a Tor, la tua connessione si farà notare dagli amministratori della rete locale o dal tuo ISP. Il rilevamento e la correlazione di questo traffico [è stato fatto](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in passato dagli amministratori di rete per identificare e deanonimizzare specifici utenti Tor sulla loro rete. D'altra parte, la connessione a una VPN è quasi sempre meno sospetta, perché i fornitori VPN commerciali sono utilizzati dai consumatori di tutti i giorni per una serie di attività banali come l'aggiramento delle geo-restrizioni, anche in Paesi con forti restrizioni su Internet. -Pertanto, dovresti fare uno sforzo per nascondere il tuo indirizzo IP **prima di** connetterti alla rete Tor. Puoi farlo semplicemente collegandoti a una VPN (tramite un client installato sul tuo computer) e poi accedere a [Tor](../tor.md) come di consueto, ad esempio tramite il Tor Browser. In questo modo si crea una catena di connessioni del tipo: +Pertanto, dovresti fare uno sforzo per nascondere il tuo indirizzo IP **prima di** connetterti alla rete Tor. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] Tu → VPN → Tor → Internet Dal punto di vista del tuo ISP, sembra che stai accedendo normalmente a una VPN (con la relativa copertura che ti fornisce). Dal punto di vista della tua VPN, possono vedere che ti stai connettendo alla rete Tor, ma non possono sapere a quali siti web stai accedendo. Dal punto di vista di Tor, ti stai connettendo normalmente, ma nell'improbabile caso di una qualche compromissione della rete Tor, solo l'IP della tua VPN sarebbe esposto, e la tua VPN dovrebbe *inoltre* essere compromessa per deanonimizzarvi. -Questo **non è** un consiglio per aggirare la censura, perché se Tor è bloccato completamente dal tuo ISP, probabilmente lo sarà anche la tua VPN. Piuttosto, questa raccomandazione mira a far sì che il tuo traffico si confonda meglio con il traffico comune degli utenti della VPN e ti fornisca un certo livello di plausibile negabilità nascondendo il fatto che ti stai connettendo a Tor dal tuo ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Piuttosto, questa raccomandazione mira a far sì che il tuo traffico si confonda meglio con il traffico comune degli utenti della VPN e ti fornisca un certo livello di plausibile negabilità nascondendo il fatto che ti stai connettendo a Tor dal tuo ISP. --- @@ -51,7 +51,7 @@ Noi **sconsigliamo vivamente** di combinare Tor con una VPN in qualsiasi altro m - Tu → VPN → Tor → VPN → Internet - Qualsiasi altra configurazione -Alcuni provider di VPN e altre pubblicazioni raccomandano occasionalmente queste **errate** configurazioni per eludere i ban di Tor (i nodi di uscita sono bloccati dai siti web) in alcuni luoghi. [Normalmente](https://support.torproject.org/#about_change-paths), Tor cambia frequentemente il percorso del circuito attraverso la rete. Quando si sceglie una *destinazione permanente* VPN (collegandosi a un server VPN *dopo* Tor), si elimina questo vantaggio e si danneggia drasticamente l'anonimato. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normalmente](https://support.torproject.org/#about_change-paths), Tor cambia frequentemente il percorso del circuito attraverso la rete. Quando si sceglie una *destinazione permanente* VPN (collegandosi a un server VPN *dopo* Tor), si elimina questo vantaggio e si danneggia drasticamente l'anonimato. È difficile impostare accidentalmente configurazioni errate come queste, perché di solito si tratta di configurare impostazioni proxy personalizzate all'interno di Tor Browser o di configurare impostazioni proxy personalizzate all'interno del client VPN che instrada il traffico VPN attraverso Tor Browser. Se si evitano queste configurazioni non predefinite, probabilmente dovresti essere a posto. @@ -60,7 +60,7 @@ Alcuni provider di VPN e altre pubblicazioni raccomandano occasionalmente queste

Fingerprinting VPN/SSH

-Il Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) afferma che *teoricamente* l'utilizzo di una VPN per nascondere le attività Tor al proprio ISP potrebbe non essere infallibile. Le VPN sono risultate vulnerabili al fingerprinting del traffico dei siti web, in cui un avversario può comunque indovinare quale sito web viene visitato, perché tutti i siti web hanno modelli di traffico specifici. +Il Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) afferma che *teoricamente* l'utilizzo di una VPN per nascondere le attività Tor al proprio ISP potrebbe non essere infallibile. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Pertanto, non è irragionevole credere che anche il traffico Tor crittografato nascosto da una VPN possa essere rilevato con metodi simili. Non esistono ricerche in merito e riteniamo che i vantaggi dell'utilizzo di una VPN siano di gran lunga superiori a questi rischi, ma è un aspetto da tenere presente. @@ -68,11 +68,11 @@ Se sei ancora convinto che i trasporti collegabili (bridge) forniscano una prote
-Per stabilire se sia il caso di utilizzare una VPN per connettersi alla rete Tor è necessario un po' di buon senso e la conoscenza delle politiche del proprio governo e del proprio ISP in merito a ciò a cui ci si connette. Tuttavia, anche in questo caso, nella maggior parte dei casi sarà meglio essere visti come connessi a una rete VPN commerciale piuttosto che direttamente alla rete Tor. Se i provider di VPN sono censurati nella tua zona, puoi anche considerare l'utilizzo di trasporti Tor pluggable (ad esempio Snowflake o meek bridge) come alternativa, ma l'uso di questi bridge può destare più sospetti rispetto ai tunnel WireGuard/OpenVPN standard. +Per stabilire se sia il caso di utilizzare una VPN per connettersi alla rete Tor è necessario un po' di buon senso e la conoscenza delle politiche del proprio governo e del proprio ISP in merito a ciò a cui ci si connette. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## Cosa NON è Tor -La rete Tor non è uno strumento di protezione della privacy perfetto in tutti i casi e presenta una serie di svantaggi che devono essere considerati con attenzione. Questi elementi non ti devono scoraggiare dall'utilizzare Tor se è adatto alle tue esigenze, ma sono comunque elementi su cui riflettere per decidere la soluzione più adatta a te. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. Questi elementi non ti devono scoraggiare dall'utilizzare Tor se è adatto alle tue esigenze, ma sono comunque elementi su cui riflettere per decidere la soluzione più adatta a te. ### Tor non è una VPN gratuita @@ -80,26 +80,26 @@ Il rilascio dell'applicazione mobile *Orbot* ha portato molte persone a descrive A differenza dei nodi di uscita di Tor, i fornitori di VPN di solito non sono *attivamente* [malevoli](#caveats). Poiché i nodi di uscita Tor possono essere creati da chiunque, sono punti caldi per il monitoraggio della rete e per le modifiche. Nel 2020, è stato documentato che molti nodi di uscita Tor effettuavano il downgrade del traffico HTTPS in HTTP al fine di [dirottare le transazioni in criptovaluta](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Sono stati osservati anche altri attacchi ai nodi di uscita, come la sostituzione dei download tramite canali non crittografati con malware. HTTPS attenua in una certa misura queste minacce. -Come abbiamo già accennato, Tor è anche facilmente identificabile sulla rete. A differenza di un vero e proprio provider VPN, l'utilizzo di Tor ti farà passare per una persona che probabilmente sta cercando di eludere le autorità. In un mondo perfetto, Tor sarebbe visto dagli amministratori di rete e dalle autorità come uno strumento dai molteplici usi (come vengono viste le VPN), ma in realtà la percezione di Tor è ancora molto meno legittima di quella delle VPN commerciali, per cui l'uso di una VPN vera e propria fornisce una plausibile negazione, ad esempio "la stavo usando solo per guardare Netflix", ecc. +Come abbiamo già accennato, Tor è anche facilmente identificabile sulla rete. A differenza di un vero e proprio provider VPN, l'utilizzo di Tor ti farà passare per una persona che probabilmente sta cercando di eludere le autorità. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### L'utilizzo di Tor non è irrilevabile -**Anche se utilizzi ponti e trasporti collegabili**, Tor Project non fornisce alcuno strumento per nascondere che tu stia utilizzando Tor dal tuo ISP. Nemmeno l'utilizzo di "trasporti collegabili" o di ponti non pubblici, nasconde il fatto che tu stia utilizzando un canale privato di comunicazione. I trasporti pluggable più popolari come obfs4 (che offusca il tuo traffico affinchè "non sembri nulla") e meek (che utilizza il domain fronting per mimetizzare il tuo traffico) possono essere [rilevati](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con tecniche di analisi del traffico abbastanza standard. Snowflake presenta problemi simili e può essere [facilmente individuato](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *prima ancora* che venga stabilita una connessione Tor. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Nemmeno l'utilizzo di "trasporti collegabili" o di ponti non pubblici, nasconde il fatto che tu stia utilizzando un canale privato di comunicazione. I trasporti pluggable più popolari come obfs4 (che offusca il tuo traffico affinchè "non sembri nulla") e meek (che utilizza il domain fronting per mimetizzare il tuo traffico) possono essere [rilevati](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con tecniche di analisi del traffico abbastanza standard. Snowflake presenta problemi simili e può essere [facilmente individuato](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *prima ancora* che venga stabilita una connessione Tor. -Esistono altri trasporti collegabili oltre questi tre, ma si affidano tipicamente alla sicurezza tramite l'oscuramento per eludere il rilevamento. Non sono impossibili da rilevare, sono semplicemente utilizzati da così poche persone, che non vale la pena creare dei rilevatori specifici. Non ci si dovrebbe affidare, specificamente se si è monitorati. +Esistono altri trasporti collegabili oltre questi tre, ma si affidano tipicamente alla sicurezza tramite l'oscuramento per eludere il rilevamento. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. Non ci si dovrebbe affidare, specificamente se si è monitorati. È fondamentale comprendere la differenza tra l'aggiramento della censura e l'elusione del rilevamento. È più facile compiere la prima a causa delle molte limitazioni reali su ciò che i censori della rete possano realmente compiere in massa, ma tali tecniche non nascondono che tu, tu *nello specifico*, stai utilizzando Tor, da una parte interessata che monitora la tua rete. ### Il Browser Tor non è il browser più *sicuro* -L'anonimato può spesso essere in contrasto con la sicurezza: l'anonimato di Tor richiede che ogni utente sia identico, creando una monocultura (gli stessi bug sono presenti per tutti gli utenti del Tor Browser). Come regola generale di cybersicurezza, le monoculture sono generalmente considerate come negative: la sicurezza tramite la diversità (che manca a Tor), fornisce la segmentazione naturale, limitando le vulnerabilità dei gruppi più piccoli, ed è dunque più desiderabile, pur essendo a costo dell'anonimato. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). Come regola generale di cybersicurezza, le monoculture sono generalmente considerate come negative: la sicurezza tramite la diversità (che manca a Tor), fornisce la segmentazione naturale, limitando le vulnerabilità dei gruppi più piccoli, ed è dunque più desiderabile, pur essendo a costo dell'anonimato. Inoltre, Tor Browser si basa sulle build delle Versioni di Supporto Esteso di Firefox, che ricevono correzioni soltanto per le vulnerabilità considerate *Critiche* ed *Elevate* (non *Medie* e *Basse*). Ciò significa che dei malintenzionati potrebbero, ad esempio: 1. Cercare delle vulnerabilità Critiche/Alte sulle build nightly o beta, quindi controllare se possano essere sfruttate su Tor Browser (questo periodo di vulnerabilità può durare settimane). 2. Incatenare tra loro *svariate* vulnerabilità Medie/Basse, fino all'ottenimento del livello d'accesso desiderato (questo periodo di vulnerabilità può durare mesi o più). -Coloro che sono a rischio di vulnerabilità del browser dovrebbero considerare ulteriori protezioni per difendersi dagli exploit di Tor Browser, come l'utilizzo di Whonix su [Qubes](../os/qubes-overview.md) per contenere la propria navigazione su Tor in una VM sicura e proteggersi dalle fughe di dati. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Creazione del percorso verso i servizi Clearnet @@ -137,7 +137,7 @@ Il nodo d'uscita sarà scelto casualmente da tutti i nodi disponibili di Tor, av I "servizi Onion" (anche comunemente noti come "servizi nascosti") sono siti web accessibili esclusivamente dal browser di Tor. Questi hanno un nome di dominio lungo e generato casualmente, che termina per `.onion`. -La connessione a un Servizio Onion su Tor funziona molto similmente alla connessione a un servizio Clearnet, ma il tuo traffico è indirizzato attraverso un totale di **sei** nodi, prima di raggiungere il server di destinazione. Come prima, tuttaviaa, soltanto tre di questi nodi contribuiscono al *tuo* anonimato, mentre gli altri tre proteggono l'anonimato del *Servizio Onion*, nascondendo l'indirizzo IP e la posizione reali del sito web, così come Tor Browser sta nascondendo i tuoi. +La connessione a un Servizio Onion su Tor funziona molto similmente alla connessione a un servizio Clearnet, ma il tuo traffico è indirizzato attraverso un totale di **sei** nodi, prima di raggiungere il server di destinazione. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Percorso di Tor che mostra il traffico indirizzato attraverso i tuoi tre nodi di Tor, più tre nodi aggiuntivi Tor che nascondono l'identità del sito web](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ La connessione a un Servizio Onion su Tor funziona molto similmente alla conness ## Crittografia -Tor crittografa tre volte ogni pacchetto (un blocco di dati trasmessi), con le chiavi dai nodi d'uscita, intermedio e d'accesso, in quest'ordine. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Una volta che Tor ha costruito un circuito, la trasmissione dei dati avviene come segue: -1. Prima di tutto, quando il pacchetto arriva al nodo d'accesso, il primo livello di crittografia viene rimosso. In questo pacchetto crittografato, il nodo d'accesso troverà un altro pacchetto crittografato con l'indirizzo del nodo intermedio. Il nodo d'accesso, quindi, inoltrerà il pacchetto al nodo intermedio. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In questo pacchetto crittografato, il nodo d'accesso troverà un altro pacchetto crittografato con l'indirizzo del nodo intermedio. Il nodo d'accesso, quindi, inoltrerà il pacchetto al nodo intermedio. -2. Quindi, quando il nodo intermedio riceve il pacchetto dal nodo d'accesso, anch'esso rimuoverà un livello di crittografia con la propria chiave, trovando questa volta un pacchetto crittografato con l'indirizzo del nodo d'uscita. Il nodo intermedio, quindi, inoltrerà il pacchetto al nodo d'uscita. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. Il nodo intermedio, quindi, inoltrerà il pacchetto al nodo d'uscita. -3. Infine, quando il nodo d'uscit riceve il suo pacchetto, rimuove l'ultimo livello crittografico, con la propria chiave. Il nodo d'uscita visualizzerà l'indirizzo di destinazione e inoltrerà il pacchetto a tale indirizzo. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. Il nodo d'uscita visualizzerà l'indirizzo di destinazione e inoltrerà il pacchetto a tale indirizzo. Segue un diagramma alternativo che mostra il processo. Ogni nodo rimuove il proprio livello crittografico e, quando il server di destinazione restituisce i dati, lo stesso processo si verifica interamente al contrario. Ad esempio, il nodo d'uscita non sa chi sei, ma sa da quale nodo arriva il pacchetto, quindi, aggiunge il proprio livello di crittografia, inviandolo indietro. @@ -185,7 +185,7 @@ Se desideri utilizzare Tor per navigare sul web, consigliamo soltanto il Tor Bro I ponti di Tor sono comunemente indicati come un metodo alternativo per nascondere l'utilizzo di Tor da un ISP, piuttosto che una VPN (che suggeriamo di utilizzare, se possibile). Va considerato che, sebbene i ponti potrebbero fornire un'adeguata elusione della censura, questo è soltanto un vantaggio *transitorio*. Non ti proteggono adeguatamente dal fatto che il tuo ISP scopra che tu ti sia *precedentemente* connesso a Tor, tramite un'analisi dello storico del traffico. -Per illustrare tale punto, considera il seguente scenario: ti connetti a Tor tramite un ponte e il tuo ISP non lo rileva, perché non sta svolgendo un'analisi sofisticata del tuo traffico, quindi, tutto va come previsto. Ora, passano 4 mesi, e l'IP del tuo ponte è stato reso pubblico. Questo è un'evenienza molto comune nei ponti, scoperti e bloccati in modo relativamente frequente, ma non immediatamente. +Per illustrare tale punto, considera il seguente scenario: ti connetti a Tor tramite un ponte e il tuo ISP non lo rileva, perché non sta svolgendo un'analisi sofisticata del tuo traffico, quindi, tutto va come previsto. Ora, passano 4 mesi, e l'IP del tuo ponte è stato reso pubblico. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Il tuo ISP desidera identificare gli utenti di Tor di 4 mesi fa e, tramite la registrazione limitata dei metadati, può scoprire che ti sei connesso a un indirizzo IP, che in seguito si è rivelato essere un ponte di Tor. Non hai praticamente nessun'altra scusa per effettuare una simile connessione, quindi l'ISP può dire con estrema sicurezza che, al tempo, tu fossi un utente di Tor. @@ -193,7 +193,7 @@ Confronta ciò con il nostro scenario consigliato, in cui ti connetti a Tor tram Poiché, quasi certamente, il tuo ISP non cattura tutti i dati a livello di pacchetti, memorizzandoli per sempre, non ha modo di determinare a cosa ti fossi connesso con tale VPN *dopo* il fatto, nemmeno con una tecnica avanzata come l'ispezione profonda dei pacchetti e, dunque, mantieni una negabilità plausibile. -Dunque, i ponti forniscono maggiori benefici per eludere la censura in Internet *sul momento*, ma non sono un sostituto adeguato per **tutti** i benefici forniti dall'utilizzo di una VPN con Tor. Ancora, questo non è un consiglio *contro* l'utilizzo dei ponti di Tor, dovresti essere consapevole di tali limitazioni, mentre prendi la tua decisione. In alcuni casi i ponti potrebbero essere la *sola* opzione (ad esempio, se tutti i fornitori di VPN sono bloccati), quindi, puoi comunque utilizzarli in tali circostanze, tenendone a mente le limitazioni. +Dunque, i ponti forniscono maggiori benefici per eludere la censura in Internet *sul momento*, ma non sono un sostituto adeguato per **tutti** i benefici forniti dall'utilizzo di una VPN con Tor. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In alcuni casi i ponti potrebbero essere la *sola* opzione (ad esempio, se tutti i fornitori di VPN sono bloccati), quindi, puoi comunque utilizzarli in tali circostanze, tenendone a mente le limitazioni. Se pensi che un ponte possa aiutare a difendere dal rilevamento o altre analisi avanzate di rete più di quanto il tunnel crittografato di una VPN possa fare, puoi sempre utilizzare un ponte con un VPN. Così, sei comunque protetto dalle tecniche di offuscamento del trasporto collegabile, anche se un avversario ottiene un certo livello di visibilità nel tunnel della tua VPN. Se decidi di intraprendere questo percorso, ti consigliamo di connetterti a un ponte obfs4 dietro la tua VPN, per l'ottimale protezione dal rilevamento, piuttosto che meek o Snowflake. @@ -205,6 +205,6 @@ Se pensi che un ponte possa aiutare a difendere dal rilevamento o altre analisi - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: Il primo relay nel tuo circuito è detto "guardia d'accesso" o "guardia". È un relay veloce e stabile che rimane il primo nel tuo circuito per 2-3 mesi, per proteggerti da attacchi di deanonimizzazione noti. Il resto del tuo circuito cambia a ogni nuovo sito web che visiti e, tutti insieme, questi relay, forniscono la completa protezione della privacy di Tor. Per ulteriori informazioni sul funzionamento dei relay di guardia, consulta questo [post del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e il [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sulle guardie d'accesso. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: Il primo relay nel tuo circuito è detto "guardia d'accesso" o "guardia". È un relay veloce e stabile che rimane il primo nel tuo circuito per 2-3 mesi, per proteggerti da attacchi di deanonimizzazione noti. Il resto del tuo circuito cambia a ogni nuovo sito web che visiti e, tutti insieme, questi relay, forniscono la completa protezione della privacy di Tor. Per ulteriori informazioni sul funzionamento dei relay di guardia, consulta questo [post del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e il [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sulle guardie d'accesso. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Flag dei relay: una (s-)qualificazione speciale per le posizioni dei circuiti (ad esempio, "Guardia", "Uscita", "BadExit"), proprietà dei circuiti (ad esempio, "Veloce", "Stabile"), o ruoli (ad esempio, "Autorità", "HSDir"), come assegnato dalle autorità direttorie, e ulteriormente definito nelle specifiche del protocollo direttorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Flag dei relay: una (s-)qualificazione speciale per le posizioni dei circuiti (ad esempio, "Guardia", "Uscita", "BadExit"), proprietà dei circuiti (ad esempio, "Veloce", "Stabile"), o ruoli (ad esempio, "Autorità", "HSDir"), come assegnato dalle autorità direttorie, e ulteriormente definito nelle specifiche del protocollo direttorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/it/ai-chat.md b/i18n/it/ai-chat.md index 0167b130..52d6520b 100644 --- a/i18n/it/ai-chat.md +++ b/i18n/it/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,13 +67,13 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
-Scarica +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases) - [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases) @@ -108,7 +108,7 @@ In addition to supporting a wide range of text models, Ollama also supports [LLa [:octicons-lock-16:](https://github.com/ollama/ollama/blob/a14f76491d694b2f5a0dec6473514b7f93beeea0/SECURITY.md){ .card-link title="Security Policy" }
-Scarica +Downloads - [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows) - [:simple-apple: macOS](https://ollama.com/download/mac) @@ -124,19 +124,19 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
-Scarica +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart) - [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart) diff --git a/i18n/it/alternative-networks.md b/i18n/it/alternative-networks.md index 3171a81a..d5578341 100644 --- a/i18n/it/alternative-networks.md +++ b/i18n/it/alternative-networks.md @@ -59,7 +59,7 @@ You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh [:octicons-heart-16:](https://orbot.app/donate){ .card-link title="Contribute" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) @@ -129,7 +129,7 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or [:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) - [:simple-android: Android](https://geti2p.net/it/download#android) @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/it/android/general-apps.md b/i18n/it/android/general-apps.md index 1f804374..f350a455 100644 --- a/i18n/it/android/general-apps.md +++ b/i18n/it/android/general-apps.md @@ -70,13 +70,13 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases) @@ -116,12 +116,12 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases) diff --git a/i18n/it/android/obtaining-apps.md b/i18n/it/android/obtaining-apps.md index 6cf9dfef..acad1d72 100644 --- a/i18n/it/android/obtaining-apps.md +++ b/i18n/it/android/obtaining-apps.md @@ -19,7 +19,7 @@ There are many ways to obtain Android apps privately, even from the Play Store, [:octicons-heart-16:](https://github.com/sponsors/ImranR98){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases) @@ -48,7 +48,7 @@ The Google Play Store requires a Google account to log in, which is not great fo [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases) diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index 5fe84159..95af670b 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Le reti private virtuali spostano il rischio dal vostro ISP a una t Le Reti Private Virtuali sono un metodo d'estensione del termine della tua rete, affinché il traffico esca da qualche altra parte nel mondo. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normalmente, un ISP può visualizzare il flusso di traffico Internet in entrate e in uscita dal dispositivo di terminazione della tua rete (cioè, il modem). I protocolli crittografici come HTTPS sono comunemente utilizzati su Internet, quindi, potrebbero non riuscire a vedere esattamente ciò che stai pubblicando o leggendo, ma potrebbero farsi un'idea dei [domini che richiedi](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md index 56694e2a..0260ce7f 100644 --- a/i18n/it/basics/why-privacy-matters.md +++ b/i18n/it/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ In fin dei conti la privacy riguarda le informazioni umane, ed è importante per In molti confondono i concetti di **privacy**, **sicurezza** e **anonimato**. Vedrai persone criticare vari prodotti come "non privati", quando in realtà intendono che non forniscono, ad esempio, anonimato. Su questo sito web, copriamo tutti e tre gli argomenti, ma è importante che tu ne comprenda le differenze, nonché quando ognuno di essi entra in gioco. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Ad esempio, considera i moduli di consenso per i cookie. Potresti incontrarli do La privacy dev'essere integrata nei [software e servizi](../tools.md) che utilizziamo di default, non puoi rendere private gran parte delle app, da solo. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Fonti diff --git a/i18n/it/browser-extensions.md b/i18n/it/browser-extensions.md index fba2f051..04cf849c 100644 --- a/i18n/it/browser-extensions.md +++ b/i18n/it/browser-extensions.md @@ -31,7 +31,7 @@ Don't install extensions which you don't immediately have a need for, or ones th [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) @@ -68,7 +68,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh) @@ -100,7 +100,7 @@ We recommend [Safari](mobile-browsers.md#safari-ios) for iOS users, which unfort [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Codice sorgente" }
-Scarica +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162) diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index eea88608..a9001739 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Attacchi Passivi](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Fornitori di Servizi](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. Le alternative elencate di seguito eliminano la necessità di fiducia implementando l'E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Se queste alternative non soddisfano le tue esigenze, ti suggeriamo di utilizzare un software di crittografia come [Cryptomator](encryption.md#cryptomator-cloud), con un altro fornitore su cloud. L'utilizzo di Cryptomator insieme a **qualsiasi** fornitore su cloud (compresi questi), può essere una buona idea per ridurre il rischio di vulnerabilità di crittografia nei client nativi di un fornitore. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -I nuovi clienti mobile di Proton Drive non sono ancora stati controllati pubblicamente da una terza parte. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ I nuovi clienti mobile di Proton Drive non sono ancora stati controllati pubblic
-Tresorit ha ricevuto una serie di controlli di sicurezza indipendenti: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Tresorit ha ricevuto una serie di controlli di sicurezza indipendenti: - Computest ha scoperto due vulnerabilità, successivamente risolte. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Questa revisione ha analizzato il codice sorgente completo di Tresorit e ha convalidato che l'implementazione corrisponde ai concetti descritti [nel white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) di Tresorit. - - Ernst & Young ha inoltre testato i client web, mobile e desktop: "I risultati dei test non hanno rilevato alcuna deviazione dalle dichiarazioni di Tresorit sulla confidenzialità dei dati." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Requisiti minimi -- Deve imporre la crittografia end-to-end. +- Must enforce E2EE. - Deve offrire un piano gratuito o un periodo di prova per testarlo. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Deve offrire un'interfaccia web che supporti le funzionalità di base per la gestione dei file. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. - I client dovrebbero essere open source. -- I client dovrebbero essere interamente controllati da una terza parte indipendente. +- Clients should be audited in their entirety by an independent third party. - Dovrebbero offrire client nativi per Linux, Android, Windows, macOS e iOS. - Questi client dovrebbero integrarsi con gli strumenti nativi del sistema operativo per i fornitori dell'archiviazione su cloud, come l'integrazione dell'app Files su iOS o la funzionalità di DocumentsProvider su Android. -- Dovrebbero supportare una facile condivisione dei file con altri utenti. +- Should support easy file sharing with other users. - Dovrebbero offrire almeno un'anteprima di base dei file e una funzionalità di modifica sull'interfaccia web. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001): La conformità 2013 riguarda la [Gestione della sicurezza informatica](https://en.wikipedia.org/wiki/Information_security_management) dell'azienda e copre la vendita, lo sviluppo, la manutenzione e il supporto dei servizi su cloud. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 774722b0..699b25d1 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -34,7 +34,7 @@ Non dovresti **mai** utilizzare la sfocatura per nascondere [il testo nelle imma
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Non dovresti **mai** utilizzare la sfocatura per nascondere [il testo nelle imma **ExifEraser** è un'applicazione moderna e priva di permessi, per cancellare i metadati delle immagini, per Android. -Attualmente supporta file JPEG, PNG e WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 6fdce8ec..beb539b0 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -91,7 +91,7 @@ Invece, se necessiti di navigare anonimamente su Internet, dovresti utilizzare [ Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Se desideri configurare il tuo browser in modo più completo e il fingerprinting non ti preoccupa, consigliamo invece [Firefox](#firefox). diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index 2330c200..62811dfa 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -24,8 +24,8 @@ Le distribuzioni di Linux sono comunemente consigliate per la protezione della p **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. Queste, spesso, comportano miglioramenti alla sicurezza, privacy e utilizzabilità, in generale. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora ha un ciclo di rilascio semi continuo. While some packages like the deskt openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed segue un modello di rilascio continuo in cui ogni aggiornamento è ri **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. Per ulteriori informazioni visita le loro [Domande Frequenti](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) I **Fedora Atomic Desktops** sono varianti di Fedora che utilizzano il gestore di pacchetti `rpm-ostree` e sono fortemente incentrati sui flussi di lavoro containerizzati e su Flatpak per le applicazioni desktop. Tutte queste varianti seguono lo stesso programma di rilascio di Fedora Workstation, beneficiando degli stessi aggiornamenti veloci e restando molto vicine alla versione a monte. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS è una distribuzione indipendente basata sul gestore di pacchetti Nix, incentrata sulla riproducibilità e l'affidabilità. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcu [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -201,12 +201,12 @@ Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. Encrypted **Qubes OS** è un sistema operativo open-source progettato per fornire una forte sicurezza per i computer desktop attraverso macchine virtuali sicure (o "qube"). Qubes si basa su Xen, X Window System e Linux. Può eseguire la maggior parte delle applicazioni Linux e utilizzare la maggior parte dei driver Linux. -[:octicons-home-16: Pagina Principale](https://qubes-os.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentazione } -[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -245,11 +245,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**, in breve, consiste in una serie di script, configurazioni e pacchetti che riducono sostanzialmente la superficie di attacco di Debian. Copre di default molti dei consigli sulla privacy e la sicurezza. Inoltre, serve da OS di base per [Whonix](#whonix). -[:octicons-home-16: Pagina Principale](https://kicksecure.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentazione } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/it/dns.md b/i18n/it/dns.md index 0c967097..baeee58f 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ I software proxy per il DNS crittografato forniscono un proxy locale a cui inolt [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribuisci } +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/it/document-collaboration.md b/i18n/it/document-collaboration.md index 6c3024b2..78176c5d 100644 --- a/i18n/it/document-collaboration.md +++ b/i18n/it/document-collaboration.md @@ -28,7 +28,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-heart-16:](https://nextcloud.com/it/contribute/){ .card-link title=Contribuisci }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) @@ -54,7 +54,7 @@ Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/it/email-aliasing.md b/i18n/it/email-aliasing.md index 62e56d63..c6b0b2a6 100644 --- a/i18n/it/email-aliasing.md +++ b/i18n/it/email-aliasing.md @@ -65,7 +65,7 @@ Using an aliasing service requires trusting both your email provider and your al [:octicons-heart-16:](https://addy.io/donate){ .card-link title="Contribute" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://addy.io/faq/#is-there-an-android-app) - [:simple-appstore: App Store](https://addy.io/faq/#is-there-an-ios-app) @@ -106,7 +106,7 @@ If you cancel your subscription, you will still enjoy the features of your paid [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 7bf876d2..f8beff1a 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** è un strumento semplice e di piccole dimensioni che fornisce tecniche di crittografia moderna. Picocrypt utilizza il cifrario sicuro XChaCha20 e la funzione di derivazione della chiave Argon2id per fornire un alto livello di sicurezza. Utilizza i moduli standard x/crypto di Go per le sue funzionalità di sicurezza. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** è il metodo di FDE predefinito per Linux. È utilizzabile per crittografare interi volumi, partizioni, o creare contenitori crittografati. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/it/health-and-wellness.md b/i18n/it/health-and-wellness.md index a5b1a489..a08d154d 100644 --- a/i18n/it/health-and-wellness.md +++ b/i18n/it/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/it/index.md b/i18n/it/index.md index 762ad730..89a77576 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Vedrai persone criticare vari prodotti come "non privati", quando in realtà intendono che non forniscono, ad esempio, anonimato. Su questo sito web, copriamo tutti e tre gli argomenti, ma è importante che tu ne comprenda le differenze, nonché quando ognuno di essi entra in gioco. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/it/language-tools.md b/i18n/it/language-tools.md index 70a1a722..16e3146d 100644 --- a/i18n/it/language-tools.md +++ b/i18n/it/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,17 +23,17 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1534275760) - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/it/maps.md b/i18n/it/maps.md index 6614b456..7ff8db88 100644 --- a/i18n/it/maps.md +++ b/i18n/it/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteri @@ -84,4 +86,4 @@ I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto pe - Apps should be open source. - Should have route planning for public transport. - Should have real-time traffic information for route planning. -- Dovrebbe supportare feature avanzate come negozi/punti di interesse (POI), informazioni e recensioni, mappe topografiche, satellitari e immagini street view. +- Should support advanced features such as detailed shop/point of interest (POI) information and reviews, topographic maps, and satellite and street view images. diff --git a/i18n/it/meta/admonitions.md b/i18n/it/meta/admonitions.md index 8af9bc6a..7fe27bcf 100644 --- a/i18n/it/meta/admonitions.md +++ b/i18n/it/meta/admonitions.md @@ -3,7 +3,7 @@ title: Moniti description: A guide for website contributors on creating admonitions. --- -I **moniti** (o "richiami") sono una scelta che gli scrittori possono utilizzare per includere contenuti in un articolo senza interrompere il flusso del documento. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Esempio di monito

@@ -41,7 +41,7 @@ TESTO ALLEGATO
``` -Il `TITOLO` deve essere specificato; se non si desidera un titolo specifico, è possibile impostarlo con lo stesso testo del `TYPE` (vedi sotto) in caso di titolo, ad esempio `Note`. Il \`TESTO ALLEGATO' deve essere formattato in Markdown. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. Il \`TESTO ALLEGATO' deve essere formattato in Markdown. ### Tipi regolari @@ -164,17 +164,17 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti ```markdown title="Recommendation Card"
-![Logo di PhotoPrism](assets/img/photo-management/photoprism.svg){ align=right } +![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** è una piattaforma auto-ospitabile per gestire le foto. Supporta la sincronizzazione e condivisione degli album, nonché una varietà di altre [funzionalità](https://photoprism.app/features). Non include E2EE, quindi è meglio ospitarla su un server attendibile e sotto il tuo controllo. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Pagina iniziale](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Download +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -189,12 +189,12 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti ![Logo PhotoPrism](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. Supporta la sincronizzazione e condivisione degli album, nonché una varietà di altre [funzionalità](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. Supporta la sincronizzazione e condivisione degli album, nonché una varietà di altre [funzionalità](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Pagina iniziale](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Scarica @@ -209,7 +209,7 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti #### `downloads` -Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la sezione dei link di download. Viene utilizzato solo all'interno delle schede di raccomandazione, come mostrato nell'esempio precedente. +This is a special type of collapsible admonition which is used to generate sections containing download links. Viene utilizzato solo all'interno delle schede di raccomandazione, come mostrato nell'esempio precedente. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la ## Vecchio formato -In tutto il sito si possono vedere alcuni moniti formattato in modo simile a questi esempi: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa.
-\*\*Questo formato non verrà più utilizzato in futuro \*\*perché incompatibile con le nuove versioni del software di traduzione Crowdin. Quando si aggiunge una nuova pagina al sito, si deve utilizzare solo il formato HTML più recente. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -Non c'è fretta di convertire i moniti con il vecchio formato in quello nuovo. Le pagine che attualmente utilizzano questa formattazione dovrebbero continuare a funzionare, ma le aggiorneremo per utilizzare il nuovo formato basato su HTML di cui sopra nel corso del tempo, man mano che continueremo ad aggiornare il sito. +Non c'è fretta di convertire i moniti con il vecchio formato in quello nuovo. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index 59ec019f..d5cc7397 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -42,10 +42,10 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Codice sorgente" } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
Scarica @@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Logo di Feeder](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** è un client moderno RSS per Android con molte [funzionalità](https://github.com/spacecowboy/Feeder#features) e funziona bene con le cartelle di feed RSS. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** è un client moderno RSS per Android con molte [funzionalità](https://github.com/spacecowboy/Feeder#features) e funziona bene con le cartelle di feed RSS. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Logo Miniflux](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Logo Miniflux](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** è un aggregatore di notizie basato sul web self-hostable. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** è un aggregatore di notizie basato sul web self-hostable. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![Logo di NetNewsWire](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** è un lettore di feed gratuito e open source per macOS e iOS con un'attenzione particolare al design e alle funzionalità native. Supporta i formati tipici dei feed, insieme al supporto integrato per i feed di Reddit. +**NetNewsWire** è un lettore di feed gratuito e open source per macOS e iOS con un'attenzione particolare al design e alle funzionalità native. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** è un lettore di feed RSS/Atom per la console di testo. È un fork attivamente mantenuto di [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Esempio

-Per iscriverti a un canale YouTube con un client RSS, cerca innanzitutto il [codice del canale](https://support.google.com/youtube/answer6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Sostituisci `[ID CANALE]` qui sotto: +Per iscriverti a un canale YouTube con un client RSS, cerca innanzitutto il [codice del canale](https://support.google.com/youtube/answer6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Sostituisci `[ID CANALE]` qui sotto: ```text https://youtube.com/feeds/videos.xml?channel_id=[ID CANALE] diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index ff7abe00..c7d91cf6 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -1,7 +1,7 @@ --- title: "Appunti" icon: material/notebook-edit-outline -description: Queste app di appunti crittografate ti consentono di tenere traccia delle tue note, senza darle alle terze parti. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNote, suggeriamo di selezionare qui un'alternativa, che supporti l'E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Basati su Cloud @@ -19,15 +19,17 @@ Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNo
-![Logo di Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** è un'app di appunti semplice e privata che rende i tuoi appunti facili e disponibili ovunque tu sia. Dispone di E2EE su ogni piattaforma e di una potente esperienza desktop con temi ed editor personalizzati. Inoltre, è stata anche [controllata indipendentemente](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Dispone di E2EE su ogni piattaforma e di una potente esperienza desktop con temi ed editor personalizzati. -[:octicons-home-16: Pagina Home](https://standardnotes.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuisci } +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). + +[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNo - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -50,15 +52,17 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for
-![Logo di Notesnook](assets/img/notebooks/notesnook.svg){ align=right } +![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** è un'app di appunti libera e open source, incentrata sulla privacy degli utenti e la facilità d'uso. Dispone di crittografia end-to-end su tutte le piattaforme, con una potente sincronizzazione per prendere appunti mentre sei in giro. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Offre l'E2EE e può sincronizzarsi con Nextcloud, Dropbox e molto altro. Offre anche la possibilità di importare facilmente note da Evernote e note in testo semplice. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Offre anche la possibilità di importare facilmente note da Evernote e note in testo semplice. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin non [supporta](https://github.com/laurent22/joplin/issues/289) la protezione con password/PIN per l'applicazione stessa o per note individuali e appunti. Tuttavia, i tuoi dati sono comunque crittografati in transito e alla posizione di sincronizzazione, utilizzando la tua chiave principale. Da gennaio 2023, Joplin [supporta](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) lo sblocco biometrico dell'app per Android e iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Tuttavia, i tuoi dati sono comunque crittografati in transito e alla posizione di sincronizzazione, utilizzando la tua chiave principale. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin non [supporta](https://github.com/laurent22/joplin/issues/289) la protezi ![Logo di Cryptee](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Logo di Cryptee](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** è un editor di documenti E2EE, nonché un'applicazione di archiviazione di foto open source e basato sul web. Cryptee è una PWA, il che significa che opera senza problemi su tutti i dispositivi moderni, senza richiedere le app native per ogni rispettiva piattaforma. +**Cryptee** è un editor di documenti E2EE, nonché un'applicazione di archiviazione di foto open source e basato sul web. -[:octicons-home-16: Pagina Home](https://crypt.ee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Codice sorgente" } +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. + +[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
-Scarica +Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. L'iscrizione non richiede un'email o altre informazioni personalmente identificabili. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Note locali @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode serve a prendere appunti, mantenere gli elenchi di attività, pianificare progetti e scrivere documenti con un sistema veloce ed efficiente di testo semplice. La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode serve a prendere appunti, mantenere gli elenchi di attività, pianificare progetti e scrivere documenti con un sistema veloce ed efficiente di testo semplice. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Home](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentazione} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/it/office-suites.md b/i18n/it/office-suites.md index 09f15b54..069fcea0 100644 --- a/i18n/it/office-suites.md +++ b/i18n/it/office-suites.md @@ -26,7 +26,7 @@ Choose an **office suite** that does not require logging in to an account to acc [:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) - [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) @@ -53,7 +53,7 @@ Choose an **office suite** that does not require logging in to an account to acc :octicons-code-16:{ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index cd348047..c0c7373d 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduzione alle password :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduzione alle password :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

I gestori di password integrati nei software, come i browser e i sistemi operativi, a volte non sono all'altezza di un software di gestione delle password dedicato. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Ad esempio, il gestore di password di Microsoft Edge non offre affatto E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Questi gestori di password, le sincronizzano su un server su cloud per una facil - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Il codice utilizzato dai server di Bitwarden è [open-source](https://github.com Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. La tua cassaforte di 1Password è protetta sia dalla password principale che da una chiave di sicurezza randomizzata di 34 caratteri per crittografare i tuoi dati sui loro server. Tale chiave di sicurezza aggiunge un livello di protezione ai tuoi dati, poiché, essi, sono protetti da un'entropia elevata, indipendentemente dalla tua password principale. Molti altri gestori delle password si affidano interamente alla forza della tua password principale per proteggere i tuoi dati. @@ -271,12 +273,12 @@ La tua cassaforte di 1Password è protetta sia dalla password principale che da [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
-Scarica +Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono&gl=It) -- [:simple-appstore: App Store](https://apps.apple.com/it/app/psono-password-manager/id1545581224) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/it/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/psono-free-password-manag/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Queste opzioni ti consentono di gestire localmente un database di password critt - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/it/pastebins.md b/i18n/it/pastebins.md index fc88a835..19ce285f 100644 --- a/i18n/it/pastebins.md +++ b/i18n/it/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. I dati sono crittografati/decrittografati nel browser utilizzando AES a 256 bit. È la versione migliorata di ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. I dati sono crittografati/decrittografati nel browser utilizzando AES a 256 bit. È la versione migliorata di ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Requisiti minimi - Deve essere open source. -- Deve implementare la crittografia end-to-end "a fiducia zero". +- Must implement "zero-trust" E2EE. - Deve supportare i file protetti da password. ### Caso migliore I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere tutte o alcune di queste funzionalità, ma quelli che le includono potrebbero essere preferiti ad altri su questa pagina. -- Dovrebbe disporre di un controllo pubblicato da una terza parte affidabile e indipendente. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/it/photo-management.md b/i18n/it/photo-management.md index 38b58dd1..ff32adfb 100644 --- a/i18n/it/photo-management.md +++ b/i18n/it/photo-management.md @@ -1,7 +1,7 @@ --- title: Gestione delle foto icon: material/image -description: Strumenti di gestione delle foto per tenere le foto personali al sicuro da occhi indiscreti dei provider di cloud storage e da altri accessi non autorizzati. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** è un servizio di backup delle foto crittografato end-to-end che supporta i backup automatici su iOS e Android. Il loro codice è completamente open source, sia dal lato del client che del server. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** è un servizio di backup delle foto crittografato end-to-end che supporta i backup automatici su iOS e Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -83,7 +86,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Requisiti minimi -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Deve offrire un piano gratuito o un periodo di prova per testarlo. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Deve offrire un'interfaccia web che supporti le funzionalità di base per la gestione dei file. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Miglior Caso -- Dovrebbe disporre di un controllo pubblicato da una terza parte affidabile e indipendente. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/it/privacy.md b/i18n/it/privacy.md index aeef7bb3..e02b8e58 100644 --- a/i18n/it/privacy.md +++ b/i18n/it/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index bcf94e93..a2326941 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Messaggistica Crittografata diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 9c943bb9..153c4c27 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -354,7 +354,7 @@ Se stai cercando maggiore **sicurezza**, dovresti sempre assicurarti di connette
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 9df32238..8a253a1e 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -31,7 +31,7 @@ schema: **Tor** è un gruppo di server gestiti da volontari che consente di connettersi gratuitamente e di migliorare la propria privacy e sicurezza su Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Suggerimento

@@ -42,7 +42,7 @@ Prima di connetterti a Tor, ti preghiamo di assicurarti di aver letto la nostra There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Alcune di queste app sono migliori di altre e, anche in questo caso, la scelta dipende dal proprio modello di minaccia. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Incrementare il numero di persone che utilizzano Tor su una base giornaliera, aiuta a ridurre il cattivo stigma nei confronti di Tor, e riduce la qualità degli "elenchi di utenti di Tor", che gli ISP e i governi potrebbero compilare. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Incrementare il numero di persone che utilizzano Tor su una base giornaliera, aiuta a ridurre il cattivo stigma nei confronti di Tor, e riduce la qualità degli "elenchi di utenti di Tor", che gli ISP e i governi potrebbero compilare. Se l'anonimato più completo è fondamentale per la tua situazione, dovresti utilizzare **soltanto** il client del Browser Tor per desktop, idealmente in una configurazione [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ Se l'anonimato più completo è fondamentale per la tua situazione, dovresti uti
-![Logo di Tor Browser](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -Il **Tor Browser** è la scelta ideale per l'anonimato, fornendoti accesso alla rete e ai ponti di Tor e include impostazioni ed estensioni predefinite, configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://torproject.org/it){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentazione } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuisci } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Non dovresti **mai** installare alcun'estensione aggiuntiva su Tor Browser o mod
-Tor Browser è progettato per impedire il fingerprinting, o la tua identificazione secondo la configurazione del tuo browser. Pertanto, è imperativo **non** modificare il browser oltre i livelli di [sicurezza](https://tb-manual.torproject.org/security-settings) predefiniti. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Tor Browser è progettato per impedire il fingerprinting, o la tua identificazione secondo la configurazione del tuo browser. Pertanto, è imperativo **non** modificare il browser oltre i livelli di [sicurezza](https://tb-manual.torproject.org/security-settings) predefiniti. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre dei sistemi operativi specificamente progettati per connettersi alla rete di Tor, come [Whonix](desktop.md#whonix) su [Qubes OS](desktop.md#qubes-os), che forniscono sicurezza e protezioni persino maggiori, rispetto al solo Tor Browser standard. @@ -90,13 +90,15 @@ Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre d ![Logo di Onion Browser](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** è un browser open-source che consente di navigare sul web in modo anonimo attraverso la rete Tor su dispositivi iOS ed è approvato dal [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** è un browser open-source che consente di navigare sul web in modo anonimo attraverso la rete Tor su dispositivi iOS ed è approvato dal [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Scarica diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index 6e3c6f56..8cc638cf 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/ja/about/donation-acceptance-policy.md b/i18n/ja/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/ja/about/donation-acceptance-policy.md +++ b/i18n/ja/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/ja/advanced/communication-network-types.md b/i18n/ja/advanced/communication-network-types.md index 0c0b62b9..282f9b85 100644 --- a/i18n/ja/advanced/communication-network-types.md +++ b/i18n/ja/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 中央集権型ネットワーク diff --git a/i18n/ja/advanced/tor-overview.md b/i18n/ja/advanced/tor-overview.md index 65d33f49..6552bba6 100644 --- a/i18n/ja/advanced/tor-overview.md +++ b/i18n/ja/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Torは、可能な限りプライバシーを守ってインター [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] あなた → VPN → Tor → インターネット From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - あなた → VPN → Tor → VPN → インターネット - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## Torでないもの -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Torは無料のVPNではありません @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPSは、これらの脅威をある程度まで低減します。 -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Torの使用は検出不可能ではありません -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## クリアネット・サービスへの通路の構築 @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an 「オニオンサービス」(一般に「隠しサービス」とも呼ばれます)とは、Torブラウザでしかアクセスできないウェブサイトのことです。 These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## 暗号化 -Torは、各パケット(送信データのブロック)を、出口ノード、中間ノード、入口ノードの鍵の順に3回暗号化します。 +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Torが回路を構築すると、データの伝送は以下のように行われます。 -1. まず、パケットが入力ノードに到達すると、暗号化の最初のレイヤーが取り除かれます。 この暗号化されたパケットの中から、入力ノードは中間ノードのアドレスを持つ、別の暗号化されたパケットを見つけます。 入力ノードはその後、パケットを中間ノードに転送します。 +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. この暗号化されたパケットの中から、入力ノードは中間ノードのアドレスを持つ、別の暗号化されたパケットを見つけます。 入力ノードはその後、パケットを中間ノードに転送します。 -2. 次に、中間ノードが入力ノードからパケットを受信すると、中間ノードもその鍵で暗号化のレイヤーを取り除き、今度は暗号化されたパケットを出口ノードのアドレスで見つけます。 中間ノードはその後、パケットを出口ノードに転送します。 +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. 中間ノードはその後、パケットを出口ノードに転送します。 -3. 最後に、出口ノードがパケットを受信すると、その鍵で最後の暗号化レイヤーを削除します。 出口ノードは宛先のアドレスを確認し、そのアドレスにパケットを転送します。 +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. 出口ノードは宛先のアドレスを確認し、そのアドレスにパケットを転送します。 以下はそのプロセスを示す別の図です。 Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/ja/ai-chat.md b/i18n/ja/ai-chat.md index 2e993f26..7bb11f05 100644 --- a/i18n/ja/ai-chat.md +++ b/i18n/ja/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/ja/alternative-networks.md b/i18n/ja/alternative-networks.md index 8adab9aa..1ea66be1 100644 --- a/i18n/ja/alternative-networks.md +++ b/i18n/ja/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ja/android/general-apps.md b/i18n/ja/android/general-apps.md index bce6b57f..442c0b02 100644 --- a/i18n/ja/android/general-apps.md +++ b/i18n/ja/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index 5ceacb37..e77191b6 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md index ce2bdda7..5fb08431 100644 --- a/i18n/ja/basics/why-privacy-matters.md +++ b/i18n/ja/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: デジタルデータが搾取される現代において、あな 多くの人は、**プライバシー**、**セキュリティ**、**匿名性**の概念を混同しています。 例えば、ある製品が匿名性を提供していないという意味で「プライベートではない」と批判する人々がいます。 このウェブサイトでは、これら3つのトピックすべてを取り上げます。まず、それぞれの違いを理解しましょう。 -[:material-movie-open-play-outline: 動画: プライバシー、匿名性、セキュリティの違い](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: 動画: プライバシー、匿名性、セキュリティの違い](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **プライバシー** @@ -58,7 +58,7 @@ description: デジタルデータが搾取される現代において、あな プライバシーは使用する[ソフトウェアやサービス](../tools.md)にデフォルトで組み込まれている必要があります。多くのアプリでは自分でプライベートにするよう設定することはできません。 -[:material-movie-open-play-outline: 動画: プライバシーを改善する5つのステップ](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## ソース diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index ef29b109..59d68b91 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network:サービスプロバイダー](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. 以下に示す選択肢では、安全なE2EEが実装されているため、サービス提供元を信頼する必要はありません。 +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### 最低要件 -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index b0a71b98..5a738f49 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index c558dd7a..405d82d8 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -91,7 +91,7 @@ schema: [Tor Browser](tor.md)と同様、Mullvad Browserは他の全てのMullvad Browserユーザーと同じフィンガープリントにすることでフィンガープリンティングを防ぐように設計されています。デフォルトのセキュリティレベル*既定の保護*、*強力な保護*と*最大限の保護*により自動的に設定されるデフォルトの設定と拡張機能が含まれています。 -そのため、デフォルトの[セキュリティレベル](https://tb-manual.torproject.org/security-settings)を調整する以外の変更は、行うべきではありません。 セキュリティレベルを調整する際には、使い続ける前にブラウザを再起動**しなければなりません**。 再起動しなければ、[セキュリティ設定は完全に適用されない可能性があり](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/)、選択した設定よりもフィンガープリンティングやエクスプロイトのリスクが高くなります。 +そのため、デフォルトの[セキュリティレベル](https://tb-manual.torproject.org/security-settings)を調整する以外の変更は、行うべきではありません。 セキュリティレベルを調整する際には、使い続ける前にブラウザを再起動**しなければなりません**。 Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. 設定を調整する以外の変更をした場合、フィンガープリンティングは一意なものとなり、このブラウザを使う意味がなくなってしまいます。 ブラウザをより詳細に設定したい場合で、フィンガープリントが重要でない場合は、代わりに[Firefox](#firefox)を推奨します。 diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 1469da22..0c105e08 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index c4f0ef79..ba751950 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ja/document-collaboration.md b/i18n/ja/document-collaboration.md index 6dd83827..2df2f0bf 100644 --- a/i18n/ja/document-collaboration.md +++ b/i18n/ja/document-collaboration.md @@ -54,7 +54,7 @@ Nextcloudでの[E2EEアプリ](https://apps.nextcloud.com/apps/end_to_end_encryp ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index f8237ccb..89fa3208 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt**は小さくシンプルな暗号化ツールで、最新の暗号化を提供します。 Picocryptは、セキュアなXChaCha20暗号とArgon2idキー派生機能を使用し、高レベルのセキュリティを提供します。 暗号化機能には、Go標準のx/cryptoモジュールを使用しています。 -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/ja/health-and-wellness.md b/i18n/ja/health-and-wellness.md index b77cdc45..5c802f59 100644 --- a/i18n/ja/health-and-wellness.md +++ b/i18n/ja/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/ja/index.md b/i18n/ja/index.md index afb57265..0f712bd9 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -114,6 +114,6 @@ schema: プライバシー、セキュリティ、匿名性は混同されることが多いです。 例えば、ある製品が匿名性を提供していないという意味で「プライベートではない」と批判する人々がいます。 このウェブサイトでは、これら3つのトピックすべてを取り上げます。まず、それぞれの違いを理解しましょう。 -[:material-movie-open-play-outline: 動画:プライバシーを改善する5つのステップ](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/ja/language-tools.md b/i18n/ja/language-tools.md index 09f9d6c5..2121e3da 100644 --- a/i18n/ja/language-tools.md +++ b/i18n/ja/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/ja/maps.md b/i18n/ja/maps.md index f86f1428..c48bc264 100644 --- a/i18n/ja/maps.md +++ b/i18n/ja/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## 規準 diff --git a/i18n/ja/meta/admonitions.md b/i18n/ja/meta/admonitions.md index 39c87c44..ecbe7da7 100644 --- a/i18n/ja/meta/admonitions.md +++ b/i18n/ja/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/ja/news-aggregators.md b/i18n/ja/news-aggregators.md index 98da98f4..9ffd0eb8 100644 --- a/i18n/ja/news-aggregators.md +++ b/i18n/ja/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-RSSクライアントでYouTubeチャンネルを購読するには、まず[チャンネルID](https://support.google.com/youtube/answer/6180214)を探します。 The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +RSSクライアントでYouTubeチャンネルを購読するには、まず[チャンネルID](https://support.google.com/youtube/answer/6180214)を探します。 The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index dce6e6cd..a06d91f2 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -1,7 +1,7 @@ --- title: "ノート" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -現在、Evernote、Google Keep、Microsoft OneNoteなどを使用している場合は、ここに掲載されたエンドツーエンド暗号化対応のアプリケーションに移行することをおすすめします。 +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## クラウドベース @@ -19,15 +19,17 @@ Keep track of your notes and journals without giving them to a third party.
-![Standard Notesのロゴ](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes**はどこでも簡単にメモを取れる、シンプルかつプライベートなノートアプリです。 すべてのプラットフォームでエンドツーエンド暗号化を使用し、テーマやカスタムエディターによる強力なデスクトップ環境を提供します。 また、[独立した監査](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit)も受けています。 +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. すべてのプラットフォームでエンドツーエンド暗号化を使用し、テーマやカスタムエディターによる強力なデスクトップ環境を提供します。 + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Keep track of your notes and journals without giving them to a third party. - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 外出先でメモを取るための強力な同期機能を備えており、すべてのプラットフォームでエンドツーエンドの暗号化を行います。 You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. エンドツーエンド暗号化対応で、NextcloudやDropboxなどを通じて同期できます。 また、Evernoteやプレーンテキストノートを簡単にインポートできます。 +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. また、Evernoteやプレーンテキストノートを簡単にインポートできます。 [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. ただし、データはマスターキーを使用した暗号化により転送中および同期先では常に保護されます。 Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. ただし、データはマスターキーを使用した暗号化により転送中および同期先では常に保護されます。 Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee ロゴ](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee ロゴ](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee**は、オープンソースでウェブベースの、端末間暗号化に対応したドキュメントエディターおよび写真ストレージのアプリケーションです。 CrypteeはPWAであり、それぞれのプラットフォームのネイティブアプリを必要とせず、最新のすべてのデバイスでシームレスに動作します。 +**Cryptee**は、オープンソースでウェブベースの、端末間暗号化に対応したドキュメントエディターおよび写真ストレージのアプリケーションです。 + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. サインアップには電子メールやその他の個人情報は必要ありません。 +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## ローカルノート @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-modeを使うと、高速かつ効果的なプレーンテキスト システムにより、メモの保存、ToDoリストの管理、プロジェクトの計画、およびドキュメントの作成を行うことができます。 [ファイル同期](file-sharing.md#file-sync)ツールを使うと同期が可能です。 +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-modeを使うと、高速かつ効果的なプレーンテキスト システムにより、メモの保存、ToDoリストの管理、プロジェクトの計画、およびドキュメントの作成を行うことができます。 File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: ホームページ](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=文書 } -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=貢献 } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 6ec8c16b..29852644 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

詳細

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/ja/pastebins.md b/i18n/ja/pastebins.md index be4101e7..8a99df30 100644 --- a/i18n/ja/pastebins.md +++ b/i18n/ja/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. PrivateBinはZeroBinの改良版です。 +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. PrivateBinはZeroBinの改良版です。 [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### 最低要件 - オープンソースであること。 -- 「ゼロトラスト」のエンドツーエンド暗号化を実装すること。 +- Must implement "zero-trust" E2EE. - パスワードで保護されたファイルをサポートすること。 ### 満たされることが望ましい基準 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ja/photo-management.md b/i18n/ja/photo-management.md index 77bb505d..aaa7b341 100644 --- a/i18n/ja/photo-management.md +++ b/i18n/ja/photo-management.md @@ -1,7 +1,7 @@ --- title: 写真管理 icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### 最低要件 -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### 満たされることが望ましい基準 -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ja/privacy.md b/i18n/ja/privacy.md index 0bcc1915..eb2f8007 100644 --- a/i18n/ja/privacy.md +++ b/i18n/ja/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index 16716d99..1c984c5b 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 暗号化されたメッセンジャー diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index 7fd0bdd5..28c61a05 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index ceee202c..6b05685c 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -31,7 +31,7 @@ schema: **Tor**はボランティアによるサーバー群で、無償で接続が可能であり、インターネット上のプライバシーとセキュリティを向上させることができます。 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 -[Torの概要 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: 動画:Torが必要な理由](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

ヒント

@@ -42,7 +42,7 @@ Torに接続する前に、Torと安全に接続する方法についての[概 Torネットワークへの接続は様々な方法がありますが、Firefoxをフォークし、デスクトップやAndroid用で[:material-incognito: 匿名](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple}ブラウジングを重視した**Tor Browser**が最も利用されています。 -Torネットワークに接続するアプリには長短があり、どれを使うかは脅威モデルによります。 ISPが不利な証拠を集めることについて心配しないTorのカジュアルなユーザーであれば、[Onion Browser](#onion-browser-ios)などのモバイルブラウザからTorネットワークに接続することは良い方法です。 日常的にTorを使う人が増えることはTorのマイナスイメージをやわらげ、ISPや政府が作成しているかもしれない「Torユーザーリスト」の質を下げることになります。 +Some of these apps are better than others; making a determination comes down to your threat model. ISPが不利な証拠を集めることについて心配しないTorのカジュアルなユーザーであれば、[Onion Browser](#onion-browser-ios)などのモバイルブラウザからTorネットワークに接続することは良い方法です。 日常的にTorを使う人が増えることはTorのマイナスイメージをやわらげ、ISPや政府が作成しているかもしれない「Torユーザーリスト」の質を下げることになります。 完全な匿名性が最優先であるなら、デスクトップのTor Browser**のみ**を使うべきであり、[Whonix](desktop.md#whonix)と[Qubes](desktop.md#qubes-os)の構成が理想的です。 モバイルブラウザではTorはあまり使われておらず(そのためフィンガープリンティングされやすい)、匿名化解除に対して厳密にテストはされていません。 @@ -52,13 +52,13 @@ Torネットワークに接続するアプリには長短があり、どれを ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser**は匿名性に重点をおいたブラウザで、Torネットワークとブリッジへアクセスできます。デフォルトの設定と拡張機能が含まれており、セキュリティのレベル*既定の保護*、*強力な保護*、*最大限の保護*を選ぶことで自動的に設定されます。 +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: ウェブページ](https://torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=ドキュメント } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=貢献 } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
ダウンロード @@ -80,7 +80,7 @@ Firefoxでおすすめされているものを含め、Tor Browserに追加の
-Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 そのため、デフォルトの[セキュリティレベル](https://tb-manual.torproject.org/security-settings)を調整する以外の変更は**行うべきではありません**。 セキュリティレベルを変更する際には、使い続ける前にブラウザを再起動**しなければなりません**。 再起動しなければ、[セキュリティ設定は完全に適用されない可能性があり](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/)、選択した設定よりもフィンガープリンティングやエクスプロイトのリスクが高くなります。 +Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 そのため、デフォルトの[セキュリティレベル](https://tb-manual.torproject.org/security-settings)を調整する以外の変更は**行うべきではありません**。 セキュリティレベルを変更する際には、使い続ける前にブラウザを再起動**しなければなりません**。 Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Tor Browserを直接コンピューターにインストールするだけではなく、[Qubes OS](desktop.md#qubes-os)上の[Whonix](desktop.md#whonix)のようにTorネットワークに接続するためのOSもあり、Tor Browser単体で使うよりもよりセキュリティを強化することができます。 @@ -90,13 +90,15 @@ Tor Browserを直接コンピューターにインストールするだけでは ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser**はiOS上でTorネットワークを経由し匿名でウェブブラウジングすることができるオープンソースのブラウザで、[Tor Project](https://support.torproject.org/glossary/onion-browser)が支持しています。 [:material-star-box: Onion Browserの最新レビュー](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser**はiOS上でTorネットワークを経由し匿名でウェブブラウジングすることができるオープンソースのブラウザで、[Tor Project](https://support.torproject.org/glossary/onion-browser)が支持しています。 -[:octicons-home-16: ウェブページ](https://onionbrowser.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="プライバシーポリシー" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=ドキュメント} -[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=貢献 } +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) + +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
ダウンロード diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index 6fd03fb5..417effe0 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -142,11 +142,12 @@ VPNキルスイッチを使っている際、システムクラッシュが[発 [:octicons-code-16:](https://github.com/ivpn){ .card-link title="ソースコード" }
-ダウンロード +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/ko/about/donation-acceptance-policy.md b/i18n/ko/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/ko/about/donation-acceptance-policy.md +++ b/i18n/ko/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/ko/advanced/communication-network-types.md b/i18n/ko/advanced/communication-network-types.md index 7c06b97b..f3c4359d 100644 --- a/i18n/ko/advanced/communication-network-types.md +++ b/i18n/ko/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 메신저 애플리케이션에서 보편적으로 사용되는 몇 사람들 간에 메시지를 전달할 때 일반적으로 쓰이는 네트워크의 구조는 여러 유형이 있습니다. 네트워크 유형마다 프라이버시 면에서 각각 다른 장단점이 존재하므로, 어떤 유형의 애플리케이션을 사용할지는 여러분의 [위협 모델](../basics/threat-modeling.md)을 고려하여 결정하는 것이 좋습니다. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 중앙 집중형 네트워크 diff --git a/i18n/ko/advanced/tor-overview.md b/i18n/ko/advanced/tor-overview.md index 6923729e..c0e53bb8 100644 --- a/i18n/ko/advanced/tor-overview.md +++ b/i18n/ko/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor는 무료로 이용 가능한 탈중앙화 네트워크입니 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Tor 네트워크를 올바르게 사용하면 비공개 및 익명 웹 탐색과 커뮤니케이션이 가능합니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Clearnet 서비스 경로 구축 방식 @@ -137,7 +137,7 @@ Those at risk of browser vulnerabilities should consider additional protections 'Onion 서비스'('Hidden 서비스'라고도 불립니다)는 Tor 브라우저로만 접근 가능한 웹사이트입니다. Onion 서비스 도메인은 랜덤으로 생성된 긴 문자열로 되어있으며, `.onion`으로 끝납니다. -Tor에서 Onion 서비스로의 연결은 클리어넷 서비스 연결과 매우 유사하게 작동하지만, 트래픽은 목적지 서버에 도달하기 전에 총 **6개**의 노드를 거쳐 라우팅됩니다. 단, 앞선 내용과 마찬가지로 *사용자의 익명성*에 기여하는 노드는 이 중 3개 뿐이며, 나머지 노드 3개는 *Onion 서비스의 익명성*을 보호합니다. 즉, Tor 브라우저가 사용자의 IP와 주소를 숨기는 것과 동일한 방식으로 웹사이트의 실제 IP와 주소를 숨깁니다. +Tor에서 Onion 서비스로의 연결은 클리어넷 서비스 연결과 매우 유사하게 작동하지만, 트래픽은 목적지 서버에 도달하기 전에 총 **6개**의 노드를 거쳐 라우팅됩니다. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![3개의 Tor 노드에 더해 웹사이트 신원을 숨기는 3개의 Tor 노드를 추가로 거쳐가는 트래픽을 나타내는 Tor 경로](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Tor에서 Onion 서비스로의 연결은 클리어넷 서비스 연결과 매 ## 암호화 -Tor는 각 패킷(전송되는 데이터 덩어리)을 출구, 중간, 입구 노드 순서대로 키를 3 번 암호화합니다. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Tor 우회로가 구축되고 나면 데이터 전송은 다음과 같이 이루어집니다: -1. 먼저, 패킷이 입구 노드에 도착하면 첫 번째 암호화 레이어가 제거됩니다. 입구 노드는 해당 암호화 패킷에서 중간 노드 주소가 포함된 또 다른 암호화 패킷을 찾습니다. 이후, 입구 노드는 중간 노드로 패킷을 전송합니다. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. 입구 노드는 해당 암호화 패킷에서 중간 노드 주소가 포함된 또 다른 암호화 패킷을 찾습니다. 이후, 입구 노드는 중간 노드로 패킷을 전송합니다. -2. 다음으로, 중간 노드가 입구 노드로부터 패킷을 수신하면 마찬가지로 키를 이용해 암호화 레이어를 제거합니다. 이번에는 출구 노드 주소가 포함된 암호화 패킷을 찾습니다. 이후, 중간 노드는 출구 노드로 패킷을 전송합니다. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. 이후, 중간 노드는 출구 노드로 패킷을 전송합니다. -3. 마지막으로, 출구 노드가 패킷을 수신하면 해당 키로 마지막 암호화 레이어를 제거합니다. 출구 노드는 목적지 주소를 확인하고 해당 주소로 패킷을 전송합니다. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. 출구 노드는 목적지 주소를 확인하고 해당 주소로 패킷을 전송합니다. 다음은 이 과정을 다이어그램으로 나타낸 것입니다. 각 노드는 해당 노드의 암호화 레이어를 제거하며, 목적지 서버가 데이터를 반환할 경우 이와 동일한 과정이 정반대로 진행됩니다. 예를 들어, 출구 노드는 사용자가 누구인지는 알 수 없으나 어떤 노드에서 전송해왔는지는 알고 있으므로 자체 암호화 레이어를 추가하여 전송합니다. @@ -185,7 +185,7 @@ Tor는 강력한 프라이버시를 보장하지만, 완벽하지는 않습니 Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: 우회로의 첫 번째 릴레이는 'Entry Guard' 혹은 'Guard'라고 합니다. 알려진 익명성 침해 공격으로부터 보호하기 위해, 우회로에서 첫 번째 릴레이로 2~3개월간 유지되는 빠르고 안정적인 릴레이입니다. 우회로의 나머지 경로는 새로운 웹사이트를 방문할 때마다 변경되며, 이러한 릴레이가 모두 모여 Tor의 완벽한 프라이버시 보호를 제공합니다. 보다 자세한 가드 릴레이 작동 방식 설명은 [이 블로그 포스트](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters)와 [이 논문](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)을 참고해 주세요. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: 우회로의 첫 번째 릴레이는 'Entry Guard' 혹은 'Guard'라고 합니다. 알려진 익명성 침해 공격으로부터 보호하기 위해, 우회로에서 첫 번째 릴레이로 2~3개월간 유지되는 빠르고 안정적인 릴레이입니다. 우회로의 나머지 경로는 새로운 웹사이트를 방문할 때마다 변경되며, 이러한 릴레이가 모두 모여 Tor의 완벽한 프라이버시 보호를 제공합니다. 보다 자세한 가드 릴레이 작동 방식 설명은 [이 블로그 포스트](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters)와 [이 논문](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)을 참고해 주세요. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: '릴레이 플래그'란 우회로 위치(Guard, Exit, BadExit 등), 우회로 속성(Fast, Stable 등), 역할(Authority, HSDir 등) 같은 릴레이의 특수 자격을 말합니다. 이는 Directory Authority에 의해 할당되며, Directory Protocol 사양에 추가로 정의되어 있습니다. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: '릴레이 플래그'란 우회로 위치(Guard, Exit, BadExit 등), 우회로 속성(Fast, Stable 등), 역할(Authority, HSDir 등) 같은 릴레이의 특수 자격을 말합니다. 이는 Directory Authority에 의해 할당되며, Directory Protocol 사양에 추가로 정의되어 있습니다. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/ko/ai-chat.md b/i18n/ko/ai-chat.md index 1a64ddd2..92dbafa7 100644 --- a/i18n/ko/ai-chat.md +++ b/i18n/ko/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/ko/alternative-networks.md b/i18n/ko/alternative-networks.md index 90b5c372..a5cdd50d 100644 --- a/i18n/ko/alternative-networks.md +++ b/i18n/ko/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ko/android/general-apps.md b/i18n/ko/android/general-apps.md index 96e7dd36..606dc32f 100644 --- a/i18n/ko/android/general-apps.md +++ b/i18n/ko/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index e7cd09b9..138e4d1e 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md index cdcbc73c..08f26ffa 100644 --- a/i18n/ko/basics/why-privacy-matters.md +++ b/i18n/ko/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we 많은 사람들은 **프라이버시**, **보안**, **익명성**의 개념을 혼동하곤 합니다. 어떤 서비스가 익명성을 제공하지 않는다는 이유로 '프라이버시 친화적이지 않다'며 비판하는 사람도 많습니다. 본 웹사이트에서는 이 세 가지 개념을 모두 주제로 다루고 있지만, 각 개념의 차이를 정확히 알고 언제 어떤 것이 필요한지를 이해해야 합니다. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **프라이버시** @@ -58,7 +58,7 @@ All of these concepts overlap, but it is possible to have any combination of the 프라이버시는 우리가 사용하는 [소프트웨어 및 서비스](../tools.md)에 기본적으로 내장되어 있어야 하는 것입니다. 사용자 개개인의 힘만으로는 직접 수많은 앱을 프라이버시 친화적이도록 수정하는 것은 불가능합니다. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## 출처 diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index 137d1f1c..34104958 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: 수동적 공격(Passive Attacks)](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: 서비스 제공자/제공 업체(Service Providers)](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. 아래에 제시된 대안은 E2EE 보안을 구현하여 '신뢰'의 필요성을 처음부터 제거합니다. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. 이러한 대안들이 여러분의 요구에 맞지 않는 경우, 다른 클라우드 제공 업체를 [Cryptomator](encryption.md#cryptomator-cloud) 등의 암호화 소프트웨어와 함께 사용할 것을 권장합니다. **어떤** 클라우드 제공 업체든(본 목록 포함), Cryptomator를 함께 사용함으로써 제공 업체의 기본 클라이언트에서 발생할 수 있는 암호화 결함 위험성을 낮출 수 있습니다. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a -Tresorit은 독립적인 보안 감사를 여러 차례 받았습니다. +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Tresorit은 독립적인 보안 감사를 여러 차례 받았습니다. - Computest는 취약점을 2개 발견했으며, 이 취약점은 해결되었습니다. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - 해당 검토에서는 Tresorit의 전체 소스 코드를 분석하여, Tresorit [백서](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf)에서 설명한 개념과 구현이 일치하는지 검증했습니다. - - Ernst & Young은 추가로 웹, 모바일, 데스크톱 클라이언트를 검사했습니다. "검사 결과, Tresorit이 주장하는 데이터 기밀성과 차이가 없는 것으로 나타났습니다." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### 최소 요구 사항 -- 종단 간 암호화가 적용되어야 합니다. +- Must enforce E2EE. - 테스트용 무료 요금제/체험판 기간을 제공해야 합니다. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 기본적인 파일 관리 기능을 지원하는 웹 인터페이스를 제공해야 합니다. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. - Clients should be open source. -- 클라이언트는 독립적인 제3자로부터 전체 감사를 받아야 합니다. +- Clients should be audited in their entirety by an independent third party. - Linux, Android, Windows, macOS, iOS 네이티브 클라이언트를 제공해야 합니다. - 클라이언트는 운영체제에서 기본으로 제공하는 클라우드 스토리지 서비스용 툴과 통합되어야 합니다. 예시: iOS '파일' 앱 연동, Android DocumentsProvider 기능 등 -- 다른 사용자와의 간편한 파일 공유를 지원해야 합니다. +- Should support easy file sharing with other users. - 웹 인터페이스에서 최소한 기본적인 파일 미리보기 및 편집 기능을 제공해야 합니다. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 준수는 회사의 [정보 보안 관리 시스템](https://en.wikipedia.org/wiki/Information_security_management)과 연관되며 클라우드 서비스의 판매, 개발, 유지 관리 및 지원에 적용됩니다. diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index d2febeee..bc91ab03 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -34,7 +34,7 @@ cover: data-redaction.webp
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ cover: data-redaction.webp **ExifEraser**는 Android용 이미지 메타데이터 제거 애플리케이션으로, 최신식이며 시스템 권한을 필요로 하지 않습니다. -현재 JPEG, PNG, WebP 파일을 지원합니다. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index 2c48fe15..31d4ff48 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. 만약 핑거프린팅을 신경 쓰지 않고 자유로운 브라우저 설정을 원하실 경우, [Firefox](#firefox)를 추천드립니다. diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index a15d3315..59326abf 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -24,8 +24,8 @@ cover: desktop.webp **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. 최신 기술은 대개 보안, 프라이버시, 사용성을 개선하는 효과를 가져옵니다. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora는 반-롤링 릴리스 방식입니다. While some packages like the des openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed는 각 업데이트가 배포판 스냅샷으로 릴리스되는 롤 **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. 자세한 내용은 Arch Linux [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)를 참고해 주세요. [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS는 재현성과 안전성에 중점을 둔 Nix 패키지 관리자를 기반으로 하는 독립 배포판입니다. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/ko/dns.md b/i18n/ko/dns.md index da25d638..bc57b1a4 100644 --- a/i18n/ko/dns.md +++ b/i18n/ko/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ko/document-collaboration.md b/i18n/ko/document-collaboration.md index 340f5550..04cf7760 100644 --- a/i18n/ko/document-collaboration.md +++ b/i18n/ko/document-collaboration.md @@ -54,7 +54,7 @@ Privacy Guides는 Nextcloud용 [E2EE 앱](https://apps.nextcloud.com/apps/end_to ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 1c243571..c7303333 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS**는 Linux에서 기본으로 사용하는 FDE 방식입니다. 전체 볼륨, 파티션을 암호화하거나 암호화 컨테이너를 만들 수 있습니다. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/ko/health-and-wellness.md b/i18n/ko/health-and-wellness.md index 53e72777..e0c26eb1 100644 --- a/i18n/ko/health-and-wellness.md +++ b/i18n/ko/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/ko/index.md b/i18n/ko/index.md index c25575b7..76e69c89 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. 어떤 서비스가 익명성을 제공하지 않는다는 이유로 '프라이버시 친화적이지 않다'며 비판하는 사람도 많습니다. 본 웹사이트에서는 이 세 가지 개념을 모두 주제로 다루고 있지만, 각 개념의 차이를 정확히 알고 언제 어떤 것이 필요한지를 이해해야 합니다. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/ko/language-tools.md b/i18n/ko/language-tools.md index 2e6bc79d..9c3d5f9c 100644 --- a/i18n/ko/language-tools.md +++ b/i18n/ko/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/ko/maps.md b/i18n/ko/maps.md index 08cbb10a..8b8a1057 100644 --- a/i18n/ko/maps.md +++ b/i18n/ko/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## 평가 기준 diff --git a/i18n/ko/meta/admonitions.md b/i18n/ko/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/ko/meta/admonitions.md +++ b/i18n/ko/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/ko/news-aggregators.md b/i18n/ko/news-aggregators.md index 5d145807..0fcd21ec 100644 --- a/i18n/ko/news-aggregators.md +++ b/i18n/ko/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. 일반적인 피드 형식과 함께 Reddit 피드를 기본 지원합니다. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat**는 텍스트 콘솔용 RSS/Atom 피드 리더입니다. [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter)로부터 포크된 프로젝트로, 활발하게 유지 관리되고 있습니다. It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-RSS 클라이언트로 Youtube 채널을 구독하려면 [채널 코드](https://support.google.com/youtube/answer/6180214)를 확인해야 합니다. The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +RSS 클라이언트로 Youtube 채널을 구독하려면 [채널 코드](https://support.google.com/youtube/answer/6180214)를 확인해야 합니다. The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index dabb75a4..7f776e4f 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -1,7 +1,7 @@ --- title: "노트 작성 애플리케이션" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -현재 Evernote, Google Keep, Microsoft OneNote와 같은 애플리케이션을 사용하고 계시다면, 여기에서 E2EE를 지원하는 대체제를 선택해 보실 것을 권장드립니다. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## 클라우드 기반 @@ -19,15 +19,17 @@ Keep track of your notes and journals without giving them to a third party.
-![Standard Notes 로고](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes**는 어디서나 간편하게 노트를 작성하고 읽을 수 있는 단순한 개인 노트 앱입니다. 모든 플랫폼에서 E2EE를 지원하며, 테마 및 사용자 정의 가능한 편집기가 포함된 강력한 데스크톱 사용 경험을 제공합니다. Standard Notes는 [독립적인 감사](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit)를 받았습니다. +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. 모든 플랫폼에서 E2EE를 지원하며, 테마 및 사용자 정의 가능한 편집기가 포함된 강력한 데스크톱 사용 경험을 제공합니다. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Keep track of your notes and journals without giving them to a third party. - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 모든 플랫폼에서 종단 간 암호화를 지원하고, 강력한 동기화 기능을 제공하여 언제 어디서든 노트를 작성할 수 있습니다. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. E2EE를 제공하며, Nextcloud, Dropbox 등을 통해 동기화 가능합니다. Evernote나 일반 텍스트 노트에서 간편하게 가져올 수 있는 기능도 제공합니다. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Evernote나 일반 텍스트 노트에서 간편하게 가져올 수 있는 기능도 제공합니다. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. 전송 과정 및 동기화 서버에서는 마스터 키로 여러분의 데이터가 암호화됩니다. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. 전송 과정 및 동기화 서버에서는 마스터 키로 여러분의 데이터가 암호화됩니다. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee 로고](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee 로고](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee**는 웹 기반 E2EE 문서 편집기 및 사진 저장 애플리케이션으로, 오픈 소스입니다. Cryptee는 PWA이기 때문에 각 플랫폼별 네이티브 앱 없이도 모든 최신 기기에서 원활하게 작동합니다. +**Cryptee**는 웹 기반 E2EE 문서 편집기 및 사진 저장 애플리케이션으로, 오픈 소스입니다. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. 가입 시 이메일 등의 개인 식별 정보를 필요로 하지 않습니다. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## 로컬 노트 작성 @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. 빠르고 효과적인 일반 텍스트 시스템으로 노트 작성, 할 일 목록 관리, 프로젝트 계획, 문서 작성이 가능합니다. [파일 동기화](file-sharing.md#file-sync) 툴을 이용하면 동기화 가능합니다. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. 빠르고 효과적인 일반 텍스트 시스템으로 노트 작성, 할 일 목록 관리, 프로젝트 계획, 문서 작성이 가능합니다. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: 홈페이지](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=문서} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 061a6ae9..a4eb028d 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[비밀번호 입문 :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[비밀번호 입문 :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

브라우저나 운영 체제 등에 내장된 비밀번호 관리자는 전용 비밀번호 관리자 소프트웨어에 비해 부족한 경우가 있습니다. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -예를 들어, Microsoft Edge 내의 비밀번호 관리자는 E2EE를 전혀 제공하지 않습니다. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ schema: - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. 1Password 보관함은 마스터 비밀번호와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. 이 보안 키의 존재로 인해, 여러분은 마스터 비밀번호 강도에 관계없이 여러분의 데이터를 높은 엔트로피로 보호할 수 있습니다. 대부분의 다른 비밀번호 관리자는 사용자 데이터 보호를 사용자의 마스터 비밀번호 강도에만 전적으로 의존합니다. @@ -276,7 +278,7 @@ Traditionally, 1Password has offered the best password manager user experience f - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/ko/pastebins.md b/i18n/ko/pastebins.md index 1d792b98..cf55ed41 100644 --- a/i18n/ko/pastebins.md +++ b/i18n/ko/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. 데이터는 브라우저에서 AES-256으로 암호화/복호화됩니다. ZeroBin을 개선한 버전의 서비스이기도 합니다. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. 데이터는 브라우저에서 AES-256으로 암호화/복호화됩니다. ZeroBin을 개선한 버전의 서비스이기도 합니다. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### 최소 요구 사항 - 오픈 소스여야 합니다. -- 'Zero Trust' 종단 간 암호화를 구현해야 합니다. +- Must implement "zero-trust" E2EE. - 파일을 비밀번호로 보호하는 기능을 지원해야 합니다 ### 우대 사항 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. -- 평판이 좋은 독립적인 제3자로부터 공개 감사를 받아야 합니다. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ko/photo-management.md b/i18n/ko/photo-management.md index 3968d471..b20afd64 100644 --- a/i18n/ko/photo-management.md +++ b/i18n/ko/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### 최소 요구 사항 -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - 테스트용 무료 요금제/체험판 기간을 제공해야 합니다. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 기본적인 파일 관리 기능을 지원하는 웹 인터페이스를 제공해야 합니다. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### 우대 사항 -- 평판이 좋은 독립적인 제3자로부터 공개 감사를 받아야 합니다. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ko/privacy.md b/i18n/ko/privacy.md index 9544b5ce..79002465 100644 --- a/i18n/ko/privacy.md +++ b/i18n/ko/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index a293625c..ec62a43b 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 암호화 메신저 diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index 12855b49..f850118b 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index afac7090..5261ee3e 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Tor에 연결하기 전에 [개요](advanced/tor-overview.md)에서 Tor가 무 There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Tor를 일상에서 사용하는 사용자가 증가한다면 Tor에 대한 부정적인 이미지를 해소할 수 있고, 정부 또는 ISP가 Tor 사용자 명단을 수집하는 행위의 가치를 줄일 수 있습니다. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Tor를 일상에서 사용하는 사용자가 증가한다면 Tor에 대한 부정적인 이미지를 해소할 수 있고, 정부 또는 ISP가 Tor 사용자 명단을 수집하는 행위의 가치를 줄일 수 있습니다. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Tor Browser 로고](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor 브라우저**는 익명성이 필요한 경우 선택해야 할 브라우저입니다. 이 브라우저는 Tor 네트워크와 브릿지에 접근할 수 있도록 해주며, 기본 보안 수준인 Standard, Safer, Safest에 따라 자동으로 구성되는 기본 설정과 확장 기능을 탑재하고 있습니다. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Tor 브라우저에서는 **절대로** 추가 확장 프로그램을 설치하
-Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식별을 방지하도록 설계되었습니다. 따라서, 브라우저를 기본 [보안 수준](https://tb-manual.torproject.org/security-settings)을 벗어나는 수정을 해서는 **안 됩니다**. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식별을 방지하도록 설계되었습니다. 따라서, 브라우저를 기본 [보안 수준](https://tb-manual.torproject.org/security-settings)을 벗어나는 수정을 해서는 **안 됩니다**. When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qubes OS](desktop.md#qubes-os)의 [Whonix](desktop.md#whonix)처럼 Tor 네트워크에 연결하기 위한 용도로 만들어진 운영 체제도 있습니다. 이러한 연결 방식은 Tor Browser를 사용하는 것보다 더 강력한 보안을 제공합니다. @@ -90,13 +90,15 @@ Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qube ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index f6bd4fa8..cd50e2d1 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/ku-IQ/about/donation-acceptance-policy.md b/i18n/ku-IQ/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/ku-IQ/about/donation-acceptance-policy.md +++ b/i18n/ku-IQ/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/ku-IQ/advanced/communication-network-types.md b/i18n/ku-IQ/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/ku-IQ/advanced/communication-network-types.md +++ b/i18n/ku-IQ/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/ku-IQ/advanced/tor-overview.md b/i18n/ku-IQ/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/ku-IQ/advanced/tor-overview.md +++ b/i18n/ku-IQ/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/ku-IQ/ai-chat.md b/i18n/ku-IQ/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/ku-IQ/ai-chat.md +++ b/i18n/ku-IQ/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/ku-IQ/alternative-networks.md b/i18n/ku-IQ/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/ku-IQ/alternative-networks.md +++ b/i18n/ku-IQ/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ku-IQ/android/general-apps.md b/i18n/ku-IQ/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/ku-IQ/android/general-apps.md +++ b/i18n/ku-IQ/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/ku-IQ/basics/vpn-overview.md b/i18n/ku-IQ/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/ku-IQ/basics/vpn-overview.md +++ b/i18n/ku-IQ/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/ku-IQ/basics/why-privacy-matters.md +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md index a8507937..0f57cad7 100644 --- a/i18n/ku-IQ/desktop-browsers.md +++ b/i18n/ku-IQ/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 64592e48..50675a81 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/ku-IQ/dns.md b/i18n/ku-IQ/dns.md index 1e0a41a4..f396c9da 100644 --- a/i18n/ku-IQ/dns.md +++ b/i18n/ku-IQ/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ku-IQ/document-collaboration.md b/i18n/ku-IQ/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/ku-IQ/document-collaboration.md +++ b/i18n/ku-IQ/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index 10e27f11..397dce64 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/ku-IQ/health-and-wellness.md b/i18n/ku-IQ/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/ku-IQ/health-and-wellness.md +++ b/i18n/ku-IQ/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index b181fecd..f200d7ef 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/ku-IQ/language-tools.md b/i18n/ku-IQ/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/ku-IQ/language-tools.md +++ b/i18n/ku-IQ/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/ku-IQ/maps.md b/i18n/ku-IQ/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/ku-IQ/maps.md +++ b/i18n/ku-IQ/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/ku-IQ/meta/admonitions.md b/i18n/ku-IQ/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/ku-IQ/meta/admonitions.md +++ b/i18n/ku-IQ/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/ku-IQ/news-aggregators.md b/i18n/ku-IQ/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/ku-IQ/news-aggregators.md +++ b/i18n/ku-IQ/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index 7c0b44c2..e03fee83 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index f7772c69..ba58acd0 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/ku-IQ/pastebins.md b/i18n/ku-IQ/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/ku-IQ/pastebins.md +++ b/i18n/ku-IQ/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ku-IQ/photo-management.md b/i18n/ku-IQ/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/ku-IQ/photo-management.md +++ b/i18n/ku-IQ/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ku-IQ/privacy.md b/i18n/ku-IQ/privacy.md index 4f8f6554..cd7a082f 100644 --- a/i18n/ku-IQ/privacy.md +++ b/i18n/ku-IQ/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index 636359f5..a8a8e3c8 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 39e10a8e..dfe335cf 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index 23b3dd57..5dde2b9c 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/nl/about/donation-acceptance-policy.md b/i18n/nl/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/nl/about/donation-acceptance-policy.md +++ b/i18n/nl/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/nl/advanced/communication-network-types.md b/i18n/nl/advanced/communication-network-types.md index 444c9ff9..34a7fffd 100644 --- a/i18n/nl/advanced/communication-network-types.md +++ b/i18n/nl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Een overzicht van verschillende netwerkarchitecturen die vaak door Er zijn verschillende netwerkarchitecturen die gewoonlijk worden gebruikt om berichten tussen mensen door te geven. Deze netwerken kunnen verschillende privacygaranties bieden, en daarom is het de moeite waard jouw [bedreigingsmodel](../basics/threat-modeling.md) in overweging te nemen bij de beslissing welke app je gaat gebruiken. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Gecentraliseerde netwerken diff --git a/i18n/nl/advanced/tor-overview.md b/i18n/nl/advanced/tor-overview.md index 35ed352f..cf9d4c5f 100644 --- a/i18n/nl/advanced/tor-overview.md +++ b/i18n/nl/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is een gratis te gebruiken, gedecentraliseerd netwerk dat is on [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Bij correct gebruik maakt het netwerk privé en anoniem browsen en communicatie mogelijk. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Opbouw van het pad naar Clearnet diensten @@ -137,7 +137,7 @@ De exit node wordt willekeurig gekozen uit alle beschikbare Tor-knooppunten met "Onion Services" (ook wel "verborgen diensten" genoemd) zijn websites die alleen toegankelijk zijn via de Tor-browser. Deze websites hebben een lange willekeurig gegenereerde domeinnaam die eindigt op `.onion`. -Verbinden met een Onion Service in Tor werkt ongeveer hetzelfde als verbinden met een clearnet service, maar je verkeer wordt door een totaal van **zes** nodes geleid voordat het de bestemmingsserver bereikt. Net als voorheen dragen echter slechts drie van deze knooppunten bij tot *jouw* anonimiteit, de andere drie knooppunten beschermen *de Onion Service's* anonimiteit, door het ware IP en de locatie van de website te verbergen op dezelfde manier als Tor Browser die van jou verbergt. +Verbinden met een Onion Service in Tor werkt ongeveer hetzelfde als verbinden met een clearnet service, maar je verkeer wordt door een totaal van **zes** nodes geleid voordat het de bestemmingsserver bereikt. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
Tor-pad dat ujouw verkeer via uw drie Tor-knooppunten leidt plus drie extra Tor-knooppunten die de identiteit van de website verbergen](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Verbinden met een Onion Service in Tor werkt ongeveer hetzelfde als verbinden me ## Encryptie -Tor versleutelt elk netwerk pakket ( in een blok verzonden gegevens) drie keer met de sleutels van het Exit-, middle- en entry node- in die volgorde. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Zodra Tor een circuit heeft gebouwd, verloopt de gegevensoverdracht als volgt: -1. Ten eerste: wanneer het pakket bij het entry node aankomt, wordt de eerste encryptielaag verwijderd. In dit versleutelde pakket vindt de entry een ander versleuteld pakket met het adres van de middle node. De entry node stuurt het pakket dan door naar de middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In dit versleutelde pakket vindt de entry een ander versleuteld pakket met het adres van de middle node. De entry node stuurt het pakket dan door naar de middle node. -2. Ten tweede: wanneer de middle node het pakket van de entr node ontvangt, verwijdert het ook een versleutelingslaag met zijn sleutel, en vindt ditmaal een versleuteld pakket met het adres van de exit node. De middle node stuurt het pakket dan door naar de exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. De middle node stuurt het pakket dan door naar de exit node. -3. Ten slotte: wanneer de exit node zijn pakket ontvangt, verwijdert het de laatste versleutelingslaag met zijn sleutel. De exit node ziet hierna bestemmingsadres en stuurt het pakket door naar dat adres. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. De exit node ziet hierna bestemmingsadres en stuurt het pakket door naar dat adres. Hieronder staat een alternatief schema dat het proces weergeeft. Elke node verwijdert zijn eigen versleutelings laag, en wanneer de bestemmings server gegevens terugstuurt, gebeurt hetzelfde proces volledig in omgekeerde richting. Zo weet de exit node niet wie je bent, maar wel van welk knooppunt het afkomstig is, en dus voegt het zijn eigen versleutelings laag toe en stuurt het het terug. @@ -185,7 +185,7 @@ Als je Tor wilt gebruiken om op het web te surfen, raden we alleen de **officië Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: De entry node in jouw circuit wordt een "bewaker" of "Guard" genoemd. Het is een snel en stabiel node dat gedurende 2-3 maanden de eerste blijft in jouw circuit, ter bescherming tegen een bekende anonimiteitsdoorbrekende aanval. De rest van je circuit verandert bij elke nieuwe website die je bezoekt, en alles bij elkaar bieden deze relays de volledige privacybescherming van Tor. Voor meer informatie over de werking van guard nodes, zie deze [blogpost](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) en [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) over inloopbeveiliging. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: De entry node in jouw circuit wordt een "bewaker" of "Guard" genoemd. Het is een snel en stabiel node dat gedurende 2-3 maanden de eerste blijft in jouw circuit, ter bescherming tegen een bekende anonimiteitsdoorbrekende aanval. De rest van je circuit verandert bij elke nieuwe website die je bezoekt, en alles bij elkaar bieden deze relays de volledige privacybescherming van Tor. Voor meer informatie over de werking van guard nodes, zie deze [blogpost](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) en [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) over inloopbeveiliging. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relaysvlag: een speciale (dis-)kwalificatie van relais voor circuitposities (bijvoorbeeld "Guard", "Exit", "BadExit"), circuiteigenschappen (bijvoorbeeld "Fast", "Stable"), of rollen (bijvoorbeeld "Authority", "HSDir"), zoals toegewezen door de directory-autoriteiten en nader gedefinieerd in de specificatie van het directory-protocol. ([https://metrics.torproject.org/glossary.html/](https://metrics.torproject.org/glossary.html)) +[^2]: Relaysvlag: een speciale (dis-)kwalificatie van relais voor circuitposities (bijvoorbeeld "Guard", "Exit", "BadExit"), circuiteigenschappen (bijvoorbeeld "Fast", "Stable"), of rollen (bijvoorbeeld "Authority", "HSDir"), zoals toegewezen door de directory-autoriteiten en nader gedefinieerd in de specificatie van het directory-protocol. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/nl/ai-chat.md b/i18n/nl/ai-chat.md index 34c1c895..23a0a8a6 100644 --- a/i18n/nl/ai-chat.md +++ b/i18n/nl/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/nl/alternative-networks.md b/i18n/nl/alternative-networks.md index 5db23c84..10a608ba 100644 --- a/i18n/nl/alternative-networks.md +++ b/i18n/nl/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/nl/android/general-apps.md b/i18n/nl/android/general-apps.md index 7fcf2291..7ba4e4e7 100644 --- a/i18n/nl/android/general-apps.md +++ b/i18n/nl/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/nl/basics/vpn-overview.md b/i18n/nl/basics/vpn-overview.md index e80c2882..86ea8c85 100644 --- a/i18n/nl/basics/vpn-overview.md +++ b/i18n/nl/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks verschuiven het risico van je ISP naar een Virtual Private Networks zijn een manier om het einde van je netwerk uit te breiden naar een uitgang ergens anders in de wereld. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normaal gesproken kan een ISP de stroom internetverkeer zien die je netwerkapparaat (d.w.z. modem) binnenkomt en verlaat. Versleutelingsprotocollen zoals HTTPS worden vaak gebruikt op het internet, dus ze kunnen misschien niet precies zien wat je post of leest, maar ze kunnen wel een idee krijgen van de [domeinen die je opvraagt](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md index ea5a2818..7b4f15bd 100644 --- a/i18n/nl/basics/why-privacy-matters.md +++ b/i18n/nl/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ De privacy gaat uiteindelijk over menselijke informatie, en dat is belangrijk om Veel mensen halen de begrippen **privacy**, **veiligheid**, en **anonimiteit** door elkaar. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Neem bijvoorbeeld de cookie popups. Je kunt deze tientallen keren per dag tegenk Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten ingebakken hebben je kan de meeste apps niet zelfstandig privé maken. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Bronnen diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index ba162ad0..5020183d 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passieve aanvallen](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Dienstverleners](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. De onderstaande alternatieven elimineren de noodzaak van vertrouwen door veilige E2EE te implementeren. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Als deze alternatieven niet aan jouw behoeften voldoen, raden wij je aan te kijken naar het gebruik van encryptiesoftware zoals [Cryptomator](encryption.md#cryptomator-cloud) met een andere cloud provider. Het gebruik van Cryptomator in combinatie met **elke** cloud provider (inclusief deze) kan een goed idee zijn om het risico van versleutelingsfouten in de native clients van een provider te verminderen. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Tresorit logo](assets/img/cloud/tresorit.svg){ align=right } -Tresorit heeft een aantal onafhankelijke beveiligingsaudits ontvangen: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Tresorit heeft een aantal onafhankelijke beveiligingsaudits ontvangen: - Computest ontdekte twee kwetsbaarheden die zijn opgelost. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Deze evaluatie analyseerde de volledige broncode van Tresorit en bevestigde dat de implementatie overeenkomt met de concepten die zijn beschreven in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young testte bovendien de web-, mobiele en desktopclients: "Testresultaten vonden geen afwijking van Tresorit's claims over de vertrouwelijkheid van gegevens." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimale vereisten -- Moet end-to-end encryptie afdwingen. +- Must enforce E2EE. - Moet een gratis plan of proefperiode aanbieden om te testen. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Moet een webinterface bieden die basisfuncties voor bestandsbeheer ondersteunt. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. - Clients should be open source. -- Clients moeten in hun geheel door een onafhankelijke derde partij worden gecontroleerd. +- Clients should be audited in their entirety by an independent third party. - Moet native clients aanbieden voor Linux, Android, Windows, macOS en iOS. - Deze clients moeten integreren met native OS tools voor cloud storage providers, zoals Files app integratie op iOS, of DocumentsProvider functionaliteit op Android. -- Moet het gemakkelijk delen van bestanden met andere gebruikers ondersteunen. +- Should support easy file sharing with other users. - Moet ten minste een basisfunctionaliteit voor het bekijken en bewerken van bestanden op de webinterface bieden. [^1]: [De naleving van ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 heeft betrekking op het beheersysteem voor informatiebeveiliging van het bedrijf [](https://en.wikipedia.org/wiki/Information_security_management) en heeft betrekking op de verkoop, de ontwikkeling, het onderhoud en de ondersteuning van hun clouddiensten. diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index 2d5b4ddb..98f32bdf 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -34,7 +34,7 @@ Je moet **nooit** vervaging gebruiken om [tekst in afbeeldingen](https://bishopf
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Je moet **nooit** vervaging gebruiken om [tekst in afbeeldingen](https://bishopf **ExifEraser** is een moderne, toestemmingsvrije applicatie voor het verwijderen van metadata in afbeeldingen voor Android. -Het ondersteunt momenteel JPEG-, PNG- en WebP-bestanden. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index 36c7fa3c..fe1318cb 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -91,7 +91,7 @@ In het algemeen raden we aan om extensies tot een minimum te beperken: ze hebben Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Als je jouw browser zwaarder wilt configureren en fingerprinting voor jou geen probleem is, raden wij in plaats daarvan [Firefox](#firefox) aan. diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index 2f039fff..4955d0d2 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -24,8 +24,8 @@ Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwar **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. Deze nieuwe technologieën gaan vaak gepaard met verbeteringen op het gebied van veiligheid, privacy en bruikbaarheid in het algemeen. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora heeft een semi-rollende release cyclus. While some packages like the desk openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed volgt een rollend release-model waarbij elke update wordt vrijgegeven **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. Zie voor meer informatie hun [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is een onafhankelijke distributie gebaseerd op de Nix pakketbeheerder met een focus op reproduceerbaarheid en betrouwbaarheid. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is een live besturingssysteem gebaseerd op Debian dat alle communicatie via Tor laat lopen. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/nl/dns.md b/i18n/nl/dns.md index 9921bd6a..b2fa0ccf 100644 --- a/i18n/nl/dns.md +++ b/i18n/nl/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Versleutelde DNS-proxy software biedt een lokale proxy voor de [onversleutelde D [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/nl/document-collaboration.md b/i18n/nl/document-collaboration.md index 21614e9c..2d7ecd25 100644 --- a/i18n/nl/document-collaboration.md +++ b/i18n/nl/document-collaboration.md @@ -54,7 +54,7 @@ Wij raden het gebruik van de [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index 9620852b..7e407bbd 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is een klein en eenvoudig encryptieprogramma dat moderne encryptie biedt. Picocrypt gebruikt het veilige XChaCha20-cijfer en de Argon2id-sleutelafleidingsfunctie om een hoog niveau van veiligheid te bieden. Het gebruikt Go's standaard x/crypto modules voor zijn versleutelingsfuncties. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is de standaard FDE-methode voor Linux. Het kan worden gebruikt om volledige volumes of partities te versleutelen, of om versleutelde containers te maken. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/nl/health-and-wellness.md b/i18n/nl/health-and-wellness.md index 51991b5b..8d30239c 100644 --- a/i18n/nl/health-and-wellness.md +++ b/i18n/nl/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/nl/index.md b/i18n/nl/index.md index eee7e8ca..a69a4e2c 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/nl/language-tools.md b/i18n/nl/language-tools.md index b3d2e0bb..0ee83706 100644 --- a/i18n/nl/language-tools.md +++ b/i18n/nl/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/nl/maps.md b/i18n/nl/maps.md index 8864f131..2265867f 100644 --- a/i18n/nl/maps.md +++ b/i18n/nl/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/nl/meta/admonitions.md b/i18n/nl/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/nl/meta/admonitions.md +++ b/i18n/nl/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/nl/news-aggregators.md b/i18n/nl/news-aggregators.md index 2a08ff0f..c4b822f2 100644 --- a/i18n/nl/news-aggregators.md +++ b/i18n/nl/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Het ondersteunt de typische feed formaten naast ingebouwde ondersteuning voor Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is een RSS/Atom feed lezer voor de tekstconsole. Het is een actief onderhouden vork van [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index 7e9c1838..3d7de4b8 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notitieboekjes" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Als je momenteel een toepassing zoals Evernote, Google Keep of Microsoft OneNote gebruikt, raden wij je aan hier een alternatief te kiezen dat E2EE ondersteunt. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-gebaseerd @@ -21,13 +21,15 @@ Als je momenteel een toepassing zoals Evernote, Google Keep of Microsoft OneNote ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities gemakkelijk en overal beschikbaar maakt. Het biedt E2EE op elk platform, en een krachtige desktop-ervaring met thema's en aangepaste editors. Het is ook [onafhankelijk gecontroleerd](https://standardnotes.com/help/2/has-standard-notes-completed-a-third party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Het biedt E2EE op elk platform, en een krachtige desktop-ervaring met thema's en aangepaste editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities g - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Het biedt end-to-end encryptie op alle platformen met een krachtige synchronisatie om je notities onderweg te maken. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Het biedt E2EE en kan synchroniseren via Nextcloud, Dropbox, en meer. Het biedt ook een gemakkelijke import vanuit Evernote en notities in gewone tekst. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Het biedt ook een gemakkelijke import vanuit Evernote en notities in gewone tekst. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Gegevens worden nog steeds versleuteld tijdens het transport en op de synchronisatielocatie met behulp van jouw hoofdsleutel. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Gegevens worden nog steeds versleuteld tijdens het transport en op de synchronisatielocatie met behulp van jouw hoofdsleutel. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is een web-gebaseerde, versleutelde, veilige foto opslag service en documenten editor. Cryptee is een PWA, wat betekent dat het naadloos werkt op alle moderne apparaten zonder dat er native apps voor elk platform nodig zijn. +**Cryptee** is een web-gebaseerde, versleutelde, veilige foto opslag service en documenten editor. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Aanmelden vereist geen e-mail of andere persoonlijk identificeerbare informatie. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Lokale notitieblokken @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is voor het bijhouden van notities, het bijhouden van Todo lijsten, het plannen van projecten, en het schrijven van documenten met een snel en effectief plain-text systeem. Synchronisatie is mogelijk met [bestandssynchronisatie](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is voor het bijhouden van notities, het bijhouden van Todo lijsten, het plannen van projecten, en het schrijven van documenten met een snel en effectief plain-text systeem. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentatie} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Broncode" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Bijdrage leveren } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 1107bbbf..9670ead8 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Uitleg over wachtwoorden :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Uitleg over wachtwoorden :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Ingebouwde wachtwoord managers in software zoals browsers en besturingssystemen zijn soms niet zo goed als speciale software voor wachtwoordbeheer. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -De wachtwoord manager in Microsoft Edge biedt bijvoorbeeld helemaal geen E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Deze wachtwoordbeheerders synchroniseren jouw wachtwoorden met een cloudserver v - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Uw 1Password-kluis is beveiligd met zowel jouw hoofdwachtwoord als een gerandomiseerde beveiligingssleutel van 34 tekens om jouw gegevens op hun servers te versleutelen. Deze beveiligingssleutel voegt een beschermingslaag toe aan jouw gegevens omdat jouw gegevens worden beveiligd met een hoge entropie, ongeacht jouw hoofdwachtwoord. Veel andere oplossingen voor wachtwoordbeheer zijn volledig afhankelijk van de sterkte van jouw hoofdwachtwoord om jouw gegevens te beveiligen. @@ -276,7 +278,7 @@ Uw 1Password-kluis is beveiligd met zowel jouw hoofdwachtwoord als een gerandomi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Met deze opties kunt je een versleutelde wachtwoorddatabase lokaal beheren. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/nl/pastebins.md b/i18n/nl/pastebins.md index e16791b5..398e2fed 100644 --- a/i18n/nl/pastebins.md +++ b/i18n/nl/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Gegevens worden in de browser versleuteld/ontsleuteld met 256-bit AES. Het is de verbeterde versie van ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Gegevens worden in de browser versleuteld/ontsleuteld met 256-bit AES. Het is de verbeterde versie van ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimale vereisten - Moet open source zijn. -- End-to-end versleuteling, "zero-trust", moet worden geïmplementeerd. +- Must implement "zero-trust" E2EE. - Moet wachtwoordbeveiligde bestanden ondersteunen. ### Beste geval Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. -- Moet een gepubliceerde audit hebben van een gerenommeerde, onafhankelijke derde partij. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/nl/photo-management.md b/i18n/nl/photo-management.md index 911bdcda..4c996621 100644 --- a/i18n/nl/photo-management.md +++ b/i18n/nl/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimale vereisten -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Moet een gratis plan of proefperiode aanbieden om te testen. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Moet een webinterface bieden die basisfuncties voor bestandsbeheer ondersteunt. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Beste geval -- Moet een gepubliceerde audit hebben van een gerenommeerde, onafhankelijke derde partij. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/nl/privacy.md b/i18n/nl/privacy.md index 37db75cf..7fe00971 100644 --- a/i18n/nl/privacy.md +++ b/i18n/nl/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index bc1a5483..8ab93c2f 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Versleutelde Messengers diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index 8a7f133e..d9a1ddba 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index 0119010f..07c95df2 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is de keuze als je anonimiteit nodig hebt, omdat het je toegang geeft tot het Tor netwerk en bruggen, en het bevat standaard instellingen en extensies die automatisch geconfigureerd worden door de standaard beveiligingsniveaus: *Standard*, *Safer* en *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Je moet **nooit** extra extensies installeren op Tor Browser of `about:config` i
-De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index d5be197b..5bb40802 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/pl/about/donation-acceptance-policy.md b/i18n/pl/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/pl/about/donation-acceptance-policy.md +++ b/i18n/pl/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/pl/advanced/communication-network-types.md b/i18n/pl/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/pl/advanced/communication-network-types.md +++ b/i18n/pl/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index 53c36926..4d1e61e1 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/pl/ai-chat.md b/i18n/pl/ai-chat.md index e860e0e9..590ac86b 100644 --- a/i18n/pl/ai-chat.md +++ b/i18n/pl/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/pl/alternative-networks.md b/i18n/pl/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/pl/alternative-networks.md +++ b/i18n/pl/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pl/android/general-apps.md b/i18n/pl/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/pl/android/general-apps.md +++ b/i18n/pl/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/pl/basics/vpn-overview.md b/i18n/pl/basics/vpn-overview.md index 6361c59d..dd69a91a 100644 --- a/i18n/pl/basics/vpn-overview.md +++ b/i18n/pl/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md index 94d46910..2c7267f7 100644 --- a/i18n/pl/basics/why-privacy-matters.md +++ b/i18n/pl/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Źródła diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index 49778314..31c5dc8f 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index e220af45..aefab365 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md index 230cb415..ac8e6240 100644 --- a/i18n/pl/desktop-browsers.md +++ b/i18n/pl/desktop-browsers.md @@ -91,7 +91,7 @@ Jeśli chcesz przeglądać Internet anonimowo, powinieneś użyć [Tor](tor.md). Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Jeśli chcesz bardziej skonfigurować swoją przeglądarkę, a fingerprinting nie jest dla Ciebie problemem, zalecamy zamiast tego [Firefox](#firefox). diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index bcf45a7c..59c99297 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -24,8 +24,8 @@ Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę pry **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/pl/dns.md b/i18n/pl/dns.md index a239d2e6..0d79ab7d 100644 --- a/i18n/pl/dns.md +++ b/i18n/pl/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pl/document-collaboration.md b/i18n/pl/document-collaboration.md index e831b59e..bd351366 100644 --- a/i18n/pl/document-collaboration.md +++ b/i18n/pl/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index c0a1e28a..cae1e636 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/pl/health-and-wellness.md b/i18n/pl/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/pl/health-and-wellness.md +++ b/i18n/pl/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/pl/index.md b/i18n/pl/index.md index 64481d32..9f8b9cef 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/pl/language-tools.md b/i18n/pl/language-tools.md index fd7fe764..ebe441ae 100644 --- a/i18n/pl/language-tools.md +++ b/i18n/pl/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/pl/maps.md b/i18n/pl/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/pl/maps.md +++ b/i18n/pl/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/pl/meta/admonitions.md b/i18n/pl/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/pl/meta/admonitions.md +++ b/i18n/pl/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/pl/news-aggregators.md b/i18n/pl/news-aggregators.md index 435b2983..ee3ecded 100644 --- a/i18n/pl/news-aggregators.md +++ b/i18n/pl/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index 4ed92dfc..f807b487 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notatniki" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsoft OneNote, sugerujemy, aby wybrać jedną z tych alternatyw, która obsługuje E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Oparte na chmurze @@ -21,13 +21,15 @@ Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsof ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsof - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 56ae5189..5e59f086 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/pl/pastebins.md b/i18n/pl/pastebins.md index 017cfa5d..772c83ec 100644 --- a/i18n/pl/pastebins.md +++ b/i18n/pl/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Musi być open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pl/photo-management.md b/i18n/pl/photo-management.md index de810148..fc8e38bf 100644 --- a/i18n/pl/photo-management.md +++ b/i18n/pl/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pl/privacy.md b/i18n/pl/privacy.md index 6708a45a..14acd548 100644 --- a/i18n/pl/privacy.md +++ b/i18n/pl/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index be051d97..92f3e968 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index d26836ce..31903d07 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 39e10a8e..dfe335cf 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index 4bf032e1..e7221c57 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/pt-BR/about/donation-acceptance-policy.md b/i18n/pt-BR/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/pt-BR/about/donation-acceptance-policy.md +++ b/i18n/pt-BR/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/pt-BR/advanced/communication-network-types.md b/i18n/pt-BR/advanced/communication-network-types.md index 9e496904..2c99316e 100644 --- a/i18n/pt-BR/advanced/communication-network-types.md +++ b/i18n/pt-BR/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral de várias estruturas de rede normalmente usadas p Existem várias arquiteturas de rede comumente usadas para retransmitir mensagens entre pessoas. Essas redes podem fornecer diferentes garantias de privacidade, e é por isso que vale a pena considerar seu [modelo de ameaça](../basics/threat-modeling.md) ao decidir qual aplicativo usar. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Redes Centralizadas diff --git a/i18n/pt-BR/advanced/tor-overview.md b/i18n/pt-BR/advanced/tor-overview.md index c03a869a..e0780535 100644 --- a/i18n/pt-BR/advanced/tor-overview.md +++ b/i18n/pt-BR/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor é uma rede descentralizada de uso gratuito, projetada para usa [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ O nó de saída será escolhido aleatoriamente entre todos os nós Tor disponív "Serviços Onion" (também conhecidos como "serviços ocultos") são sites que só podem ser acessados pelo Navegador Tor. Esses sites têm um nome de domínio longo, gerado aleatoriamente, que termina com `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor criptografa cada pacote (um bloco de dados transmitidos) três vezes com as chaves do nó de saída, do nó intermediário e do nó de entrada — nessa ordem. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/pt-BR/ai-chat.md b/i18n/pt-BR/ai-chat.md index 30fa8b47..1ebf8e56 100644 --- a/i18n/pt-BR/ai-chat.md +++ b/i18n/pt-BR/ai-chat.md @@ -44,7 +44,7 @@ Para executar a IA localmente é necessário um modelo de IA e um cliente de IA. Há muitos modelos de código aberto ou de licença livre disponíveis para download. A [Hugging Face](https://huggingface.co/models) é uma plataforma que permite que você navegue, pesquise e faça download de modelos em formatos comuns, como [GGUF](https://huggingface.co/docs/hub/en/gguf). Empresas que fornecem bons modelos de direitos facilitados incluem grandes nomes como Mistral, Meta, Microsoft e Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. Conforme mencionado acima: modelos quantizados oferecem o melhor equilíbrio entre a qualidade e o desempenho do modelo para aqueles que usam um computador pessoal (equipamento de nível de consumidor). -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/pt-BR/alternative-networks.md b/i18n/pt-BR/alternative-networks.md index 5579a00d..43e21e0e 100644 --- a/i18n/pt-BR/alternative-networks.md +++ b/i18n/pt-BR/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pt-BR/android/general-apps.md b/i18n/pt-BR/android/general-apps.md index 5bdcc512..23b83e14 100644 --- a/i18n/pt-BR/android/general-apps.md +++ b/i18n/pt-BR/android/general-apps.md @@ -70,10 +70,10 @@ O Shelter é recomendado sobre [Insular](https://secure-system.gitlab.io/Insular O **Secure Camera** é um aplicativo de câmera focado em privacidade e segurança que pode capturar imagens, vídeos e códigos QR. As extensões do fornecedor CameraX (Retrato, HDR, Visão noturna, Retoque facial e Automático) também são compatíveis com os dispositivos disponíveis. -[:octicons-repo-16: Repositório](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } -[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Código Fonte" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
Downloads @@ -116,9 +116,9 @@ O **Secure PDF Viewer** é um visualizador de PDF baseado em [pdf.js] (https://p A [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) é usada para impor que o JavaScript e as propriedades de estilo dentro do WebView sejam conteúdo totalmente estático. -[:octicons-repo-16: Repositório](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Código Fonte" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
Downloads diff --git a/i18n/pt-BR/basics/vpn-overview.md b/i18n/pt-BR/basics/vpn-overview.md index 6e6924f3..3772b816 100644 --- a/i18n/pt-BR/basics/vpn-overview.md +++ b/i18n/pt-BR/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: As Redes Privadas Virtuais transferem o risco do seu ISP para um te Redes Privadas Virtuais são uma maneira de estender o fim da sua rede para sair de outro lugar do mundo. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normalmente um provedor de serviços de internet (ISP) pode ver o fluxo de tráfego da Internet que entra e sai do seu dispositivo de rede (por exemplo, o modem). Protocolos de criptografia, como o HTTPS, são comumente usados na Internet, portanto, talvez eles não consigam ver exatamente o que você está postando ou lendo, mas podem ter uma ideia dos [domínios que você solicita](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md index 7a45795c..aa49d0bd 100644 --- a/i18n/pt-BR/basics/why-privacy-matters.md +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacidade é, no final das contas, sobre informações humanas, e isso é impo Muitas pessoas confundem os conceitos de **privacidade**, **segurança**, e **anonimato**. Você verá pessoas criticando vários produtos como "não privados" quando, na verdade, elas querem dizer que eles não fornecem anonimato, por exemplo. Neste site, examinamos todos esses três tópicos, mas é importante que você entenda a diferença entre eles e quando cada um entra em ação. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacidade** @@ -58,7 +58,7 @@ Veja os formulários de consentimento de cookies, por exemplo. Você pode encont Privacidade é algo que precisa estar incluído por padrão nos [aplicativos e serviços](../tools.md) que usamos, porque você não pode fazer com que a maioria dos aplicativos seja privada por sua própria conta. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Fontes diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index dc54b70e..ea4d8219 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Ataques Passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index f9d76ad8..bd58b33e 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md index 1630d29a..e837570a 100644 --- a/i18n/pt-BR/desktop-browsers.md +++ b/i18n/pt-BR/desktop-browsers.md @@ -95,7 +95,7 @@ Se você precisa navegar na internet de maneira anônima, você deveria usar o [ Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Se você preferir personalizar mais o navegador e a identificação das suas impressões digitais não é uma preocupação para você, recomendamos o [Firefox](#firefox). diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index c8267ae5..6981bc79 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -24,8 +24,8 @@ Distribuições Linux são comumente recomendadas para proteção de sua privaci **Fedora Linux** is our recommended desktop distribution for people new to Linux. A distribuição Fedora geralmente opta por anteceder-se na adoção de tecnologias novas por exemplo: [Wayland](https://wayland.freedesktop.org) e [PipeWire](https://pipewire.org). Essas novas tecnologias contém melhorias na segurança, na privacidade e na usabilidade geral de seus sistemas operacionais. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/pt-BR/dns.md b/i18n/pt-BR/dns.md index ab68fe14..2589d467 100644 --- a/i18n/pt-BR/dns.md +++ b/i18n/pt-BR/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pt-BR/document-collaboration.md b/i18n/pt-BR/document-collaboration.md index 304d8609..879ddebc 100644 --- a/i18n/pt-BR/document-collaboration.md +++ b/i18n/pt-BR/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index 74ad6574..e1ff5267 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** é uma ferramenta de criptografia pequena e simples que fornece criptografia moderna. O Picocrypt usa a cifra segura XChaCha20 e a função de derivação de chave do Argon2id para fornecer um alto nível de segurança. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/pt-BR/health-and-wellness.md b/i18n/pt-BR/health-and-wellness.md index c9bf8cc2..0e6b1fe9 100644 --- a/i18n/pt-BR/health-and-wellness.md +++ b/i18n/pt-BR/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index 585c755a..6e4c2469 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -114,6 +114,6 @@ Na era moderna da exploração de dados digitais, sua privacidade nunca foi tão Muitas pessoas confundem os conceitos de privacidade, segurança e anonimato. Você verá pessoas criticando vários produtos como "não privados" quando, na verdade, elas querem dizer que eles não fornecem anonimato, por exemplo. Neste site, examinamos todos esses três tópicos, mas é importante que você entenda a diferença entre eles e quando cada um entra em ação. -[:material-movie-open-play-outline: Vídeo: 5 Passos para melhorar sua privacidade digital](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/pt-BR/language-tools.md b/i18n/pt-BR/language-tools.md index 1f56974e..98fcdf56 100644 --- a/i18n/pt-BR/language-tools.md +++ b/i18n/pt-BR/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/pt-BR/maps.md b/i18n/pt-BR/maps.md index 6191e5e1..5498ec4e 100644 --- a/i18n/pt-BR/maps.md +++ b/i18n/pt-BR/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/pt-BR/meta/admonitions.md b/i18n/pt-BR/meta/admonitions.md index 3213519d..b882ba03 100644 --- a/i18n/pt-BR/meta/admonitions.md +++ b/i18n/pt-BR/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/pt-BR/news-aggregators.md b/i18n/pt-BR/news-aggregators.md index 55069881..ce24bbcb 100644 --- a/i18n/pt-BR/news-aggregators.md +++ b/i18n/pt-BR/news-aggregators.md @@ -42,9 +42,9 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. Pode ser usado off-line ou com serviços como [Nextcloud News] (https://apps.nextcloud.com/apps/news) ou [Inoreader] (https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index 07966a5a..d9af84f2 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -1,7 +1,7 @@ --- title: "Cadernos" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou Microsoft OneNote, sugerimos que escolha uma alternativa que suporte E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Baseado na nuvem @@ -19,15 +19,17 @@ Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou
-![Logotipo do Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** é um aplicativo de notas simples e privado que torna suas notas fáceis e disponíveis em qualquer lugar que você esteja. Possui E2EE em todas as plataformas e uma poderosa experiência de desktop com temas e editores personalizados. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Possui E2EE em todas as plataformas e uma poderosa experiência de desktop com temas e editores personalizados. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Ele oferece E2EE e pode sincronizar através do Nextcloud, Dropbox e muito mais. Oferece também uma importação fácil a partir do Evernote e notas de texto simples. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Oferece também uma importação fácil a partir do Evernote e notas de texto simples. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, seus dados ainda são criptografados em trânsito e no local de sincronização usando sua chave mestra. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, seus dados ainda são criptografados em trânsito e no local de sincronização usando sua chave mestra. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Criptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index b11d8612..768c4ff1 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introdução às Senhas :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introdução às Senhas :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Gerenciadores de senhas que vêm de fábrica em aplicativos como navegadores e sistemas operacionais às vezes não são tão bons quanto um aplicativo exclusivo para gerenciamento de senhas. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Por exemplo, o gerenciador de senhas do Microsoft Edge não oferece em absoluto o E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem p - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Seu cofre do 1Password é protegido com sua senha mestra e uma chave de segurança aleatória de 34 caracteres para criptografar seus dados nos servidores. Essa chave de segurança adiciona uma camada de proteção aos seus dados porque eles são protegidos com alta entropia, independentemente da sua senha mestra. Muitas outras soluções de gerenciador de senhas dependem totalmente da força de sua senha mestra para proteger seus dados. @@ -276,7 +278,7 @@ Seu cofre do 1Password é protegido com sua senha mestra e uma chave de seguran - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/pt-BR/pastebins.md b/i18n/pt-BR/pastebins.md index 08f2db9e..dcc55749 100644 --- a/i18n/pt-BR/pastebins.md +++ b/i18n/pt-BR/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Deve ser de código aberto. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Melhor Caso Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pt-BR/photo-management.md b/i18n/pt-BR/photo-management.md index d0ffadad..3f0bab10 100644 --- a/i18n/pt-BR/photo-management.md +++ b/i18n/pt-BR/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pt-BR/privacy.md b/i18n/pt-BR/privacy.md index 2c11e33e..fd95cb1e 100644 --- a/i18n/pt-BR/privacy.md +++ b/i18n/pt-BR/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index c8e61e64..966fb65b 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 69c6ca53..464cd37b 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index 1e738e71..837c3655 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -31,7 +31,7 @@ schema: A rede **Tor** é um grupo de servidores operados por voluntários que permite que você se conecte gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. -[Uma visão geral do navegador Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Por que você precisa do Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Dica

@@ -42,7 +42,7 @@ Antes de se conectar ao Tor, certifique-se de ler nosso [overview](advanced/tor- Há uma variedade de maneiras de se conectar à rede Tor a partir do seu dispositivo, o mais utilizado é o **Navegador Tor**, um fork do Firefox projetado para [:material-incognito: anônimo](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} navegação para computadores de computador e Android. -Alguns desses aplicativos são melhores do que outros, e novamente fazer uma determinação equivale ao seu modelo de ameaça. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Aumentar o número de pessoas que usam Tor todos os dias ajuda a reduzir o mau estigma do Tor, e diminui a qualidade das "listas de usuários de Tor" que os ISPs e os governos podem compilar. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Aumentar o número de pessoas que usam Tor todos os dias ajuda a reduzir o mau estigma do Tor, e diminui a qualidade das "listas de usuários de Tor" que os ISPs e os governos podem compilar. Se o anonimato mais completo for fundamental para a sua situação, você deve somente **** utilizar o cliente do navegador Tor para área de trabalho, idealmente em uma configuração de [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Navegadores móveis com acesso à rede Tor são escolhas menos comuns (e mais rastreáveis) para o usuário final, algumas de suas configurações não passaram por testes de segurança e desanimalização. @@ -52,13 +52,13 @@ Se o anonimato mais completo for fundamental para a sua situação, você deve s ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -O **Navegador Tor** é a melhor opção se você quer anonimato, pois ele fornece acesso à rede Tor e pontes, e inclui configurações padrão e extensões que são configuradas automaticamente pelos níveis de segurança: *Padrão*, *Mais seguro* e *O Mais Seguro*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Página inicial](https://torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Serviço Onion } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentação } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Código Fonte" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ Você nunca deve instalar outras extensões no Navegador Tor ou editar as config
-O Navegador Tor foi projetado para evitar a coleta de suas "impressões digitais" ou a identificação do usuário com base na configuração do navegador. Portanto, é imperativo que você **não** modifique o navegador além do padrão de níveis de segurança [](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +O Navegador Tor foi projetado para evitar a coleta de suas "impressões digitais" ou a identificação do usuário com base na configuração do navegador. Portanto, é imperativo que você **não** modifique o navegador além do padrão de níveis de segurança [](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Além de instalar o Navegador Tor diretamente no seu computador, existem também sistemas operacionais projetados especificamente para se conectar à rede Tor, como [Whonix](desktop.md#whonix) na [Qubes OS](desktop.md#qubes-os), que oferecem segurança e proteção ainda maiores do que o Navegador Tor padrão sozinho. @@ -90,13 +90,15 @@ Além de instalar o Navegador Tor diretamente no seu computador, existem também ![Logotipo do navegador Onion](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** é um navegador de código aberto que permite que você navegue na web anonimamente sobre a rede Tor em dispositivos iOS e é endossado pelo [Projeto Tor](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Leia a nossa última análise do Onion Browser.](/articles/2024/09/18/onion-browser-review) +**Onion Browser** é um navegador de código aberto que permite que você navegue na web anonimamente sobre a rede Tor em dispositivos iOS e é endossado pelo [Projeto Tor](https://support.torproject.org/glossary/onion-browser). -[:octicons-home-16: Página Inicial](https://onionbrowser.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Política de Privacidade } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Código Fonte" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribua com o projeto } +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) + +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index dd7b4def..fac46f48 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -143,9 +143,11 @@ O **IVPN** é outro provedor de VPN premium e está em operação desde 2009. A
Downloads + - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: App Store](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: GitHub](https://apps.apple.com/app/id1193122683) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/pt/about/donation-acceptance-policy.md b/i18n/pt/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/pt/about/donation-acceptance-policy.md +++ b/i18n/pt/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/pt/advanced/communication-network-types.md b/i18n/pt/advanced/communication-network-types.md index 54c81b18..e0923b3f 100644 --- a/i18n/pt/advanced/communication-network-types.md +++ b/i18n/pt/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Uma visão geral sobre as várias arquiteturas de rede normalmente Existem várias arquiteturas de rede normalmente utilizadas para transmitir mensagens entre pessoas. Estas redes podem fornecer diferentes garantias de privacidade, pelo que vale a pena considerar o seu modelo de ameaça [](../basics/threat-modeling.md) ao decidir qual a aplicação a utilizar. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Redes centralizadas diff --git a/i18n/pt/advanced/tor-overview.md b/i18n/pt/advanced/tor-overview.md index 8aafa863..207b101e 100644 --- a/i18n/pt/advanced/tor-overview.md +++ b/i18n/pt/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor é uma rede descentralizada e de utilização gratuita, concebi [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se utilizada corretamente, a rede permite a navegação e as comunicações privadas e anónimas. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Construção de caminhos para os serviços Clearnet @@ -137,7 +137,7 @@ O nó de saída é escolhido aleatoriamente de entre todos os nós Tor disponív Os "Serviços Onion" (também vulgarmente designados por "serviços ocultos") são sites que só podem ser acedidos através do Tor. Estes sites têm um nome de domínio longo que é gerado aleatoriamente e que termina em `.onion`. -A ligação a um serviço Onion no Tor funciona de forma muito semelhante à ligação a um serviço clearnet, mas o seu tráfego é encaminhado através de um total de **seis** nós, antes de chegar ao servidor de destino. No entanto, tal como antes, apenas três desses nós contribuem para *o seu* anonimato. Os restantes três nós protegem o anonimato* do Onion Service*, ocultando o verdadeiro IP e a localização do site, da mesma forma que o browser Tor oculta o seu. +A ligação a um serviço Onion no Tor funciona de forma muito semelhante à ligação a um serviço clearnet, mas o seu tráfego é encaminhado através de um total de **seis** nós, antes de chegar ao servidor de destino. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Caminho do Tor que mostra o seu tráfego sendo encaminhado através dos três nós Tor, mais os três nós Tor adicionais que escondem a identidade do site](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ A ligação a um serviço Onion no Tor funciona de forma muito semelhante à lig ## Encriptação -O Tor encripta três vezes cada um dos pacotes (blocos de dados transmitidos) com as chaves do nó de saída, do nó intermédio e do nó de entrada - por esta ordem. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Uma vez estabelecido o circuito pelo Tor, a transmissão de dados é efetuada da seguinte forma: -1. Primeiro: quando o pacote chega ao nó de entrada, a primeira camada de encriptação é removida. Neste pacote encriptado, o nó de entrada encontrará outro pacote encriptado com o endereço do nó intermédio. O nó de entrada reencaminha então o pacote para o nó intermédio. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. Neste pacote encriptado, o nó de entrada encontrará outro pacote encriptado com o endereço do nó intermédio. O nó de entrada reencaminha então o pacote para o nó intermédio. -2. Em seguida: quando o nó intermédio recebe o pacote do nó de entrada, também ele remove uma camada de encriptação com a sua chave e, desta vez, encontra um pacote encriptado com o endereço do nó de saída. O nó intermédio reencaminha então o pacote para o nó de saída. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. O nó intermédio reencaminha então o pacote para o nó de saída. -3. Por último: quando o nó de saída recebe o seu pacote, remove a última camada de encriptação com a sua chave. O nó de saída verá o endereço de destino e encaminhará o pacote para esse endereço. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. O nó de saída verá o endereço de destino e encaminhará o pacote para esse endereço. Segue-se um diagrama alternativo que mostra o processo. Cada nó remove a sua própria camada de encriptação e, quando o servidor de destino devolve os dados, o mesmo processo acontece totalmente ao contrário. Por exemplo, o nó de saída não sabe quem é o utilizador, mas sabe de que nó veio a mensagem, pelo que adiciona a sua própria camada de encriptação e envia-a de volta. @@ -185,7 +185,7 @@ Se pretender utilizar o Tor para navegar na Web, recomendamos apenas o browser T Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: O primeiro relé no seu circuito chama-se "guarda de entrada" ou "guarda". Trata-se de um retransmissor rápido e estável que permanece o primeiro no seu circuito durante 2-3 meses, a fim de o proteger contra um ataque conhecido de quebra de anonimato. O resto do seu circuito muda a cada novo site que visita e, em conjunto, estes relés fornecem todas as proteções de privacidade do Tor. Para obter mais informações sobre o funcionamento dos relés de proteção, consulte esta [publicação no blogue](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e o [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre proteções de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: O primeiro relé no seu circuito chama-se "guarda de entrada" ou "guarda". Trata-se de um retransmissor rápido e estável que permanece o primeiro no seu circuito durante 2-3 meses, a fim de o proteger contra um ataque conhecido de quebra de anonimato. O resto do seu circuito muda a cada novo site que visita e, em conjunto, estes relés fornecem todas as proteções de privacidade do Tor. Para obter mais informações sobre o funcionamento dos relés de proteção, consulte esta [publicação no blogue](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e o [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre proteções de entrada. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Flag do relé: uma (des)qualificação especial de relés para posições de circuito (por exemplo, "Guard", "Exit", "BadExit"), propriedades de circuito (por exemplo, "Fast", "Stable"), ou funções (por exemplo, "Authority", "HSDir"), tal como atribuídas pelas autoridades de diretório e definidas mais pormenorizadamente na especificação do protocolo de diretório. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Flag do relé: uma (des)qualificação especial de relés para posições de circuito (por exemplo, "Guard", "Exit", "BadExit"), propriedades de circuito (por exemplo, "Fast", "Stable"), ou funções (por exemplo, "Authority", "HSDir"), tal como atribuídas pelas autoridades de diretório e definidas mais pormenorizadamente na especificação do protocolo de diretório. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/pt/ai-chat.md b/i18n/pt/ai-chat.md index 47dfc7d3..984142ae 100644 --- a/i18n/pt/ai-chat.md +++ b/i18n/pt/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/pt/alternative-networks.md b/i18n/pt/alternative-networks.md index de11c721..a7ef94fa 100644 --- a/i18n/pt/alternative-networks.md +++ b/i18n/pt/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pt/android/general-apps.md b/i18n/pt/android/general-apps.md index d5a7605e..446d50be 100644 --- a/i18n/pt/android/general-apps.md +++ b/i18n/pt/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/pt/basics/vpn-overview.md b/i18n/pt/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/pt/basics/vpn-overview.md +++ b/i18n/pt/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md index 5eeb1a94..87136dc0 100644 --- a/i18n/pt/basics/why-privacy-matters.md +++ b/i18n/pt/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Em última análise, a privacidade diz respeito à informação humana, e sabemo Muitas pessoas confundem os conceitos de **privacidade**, **segurança** e **anonimato**. Há pessoas que criticam vários produtos como "não oferecendo privacidade", quando na realidade apenas não oferecem anonimato, por exemplo. Neste site, abordamos os três temas, mas é importante que se compreenda a diferença entre eles, e quando cada um entra em jogo. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacidade** @@ -58,7 +58,7 @@ Tome formulários para consentimento de cookies, por exemplo. Pode encontrar ess A privacidade é algo que precisamos ter feito no [software e serviços](../tools.md) que usamos por padrão, não pode dobrar a maioria dos aplicativos em modo privado por conta própria. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Fontes diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index b9bb88ee..48945458 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Ataques passivos](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Fornecedores de serviços](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Requisitos mínimos -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index 3884eb86..5c4299d6 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -36,7 +36,7 @@ Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -53,10 +53,10 @@ Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -Pode remover dados [EXIF](https://en.wikipedia.org/wiki/Exif) para muitos formatos de arquivo e foi traduzido para [many](https://gitlab.com/juanitobananas/scrambled-exif/-/tree/master/app/src/main/res) idiomas. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md index cb13dff1..72516e17 100644 --- a/i18n/pt/desktop-browsers.md +++ b/i18n/pt/desktop-browsers.md @@ -91,7 +91,7 @@ Se precisar de navegar anonimamente na internet, deverá usar antes o [Tor](tor. Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Se pretender configurar o seu browser de uma forma mais musculada e a impressão digital não for uma preocupação para si, recomendamos o [Firefox](#firefox). diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index fc2036bb..63784342 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. Estas novas tecnologias muitas vezes vêm com melhorias na segurança, privacidade e usabilidade em geral. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. Para mais informações consulte o seu [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS é uma distribuição independente baseada no gerenciador de pacotes Nix com foco na reprodutibilidade e confiabilidade. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** é um sistema operacional live baseado no Debian que roteia todas as comunicações através do Tor. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/pt/dns.md b/i18n/pt/dns.md index ff8b87fc..bf28667c 100644 --- a/i18n/pt/dns.md +++ b/i18n/pt/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pt/document-collaboration.md b/i18n/pt/document-collaboration.md index 2c8ecd1d..6c3aea71 100644 --- a/i18n/pt/document-collaboration.md +++ b/i18n/pt/document-collaboration.md @@ -54,7 +54,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index 0fc46623..9373cb8f 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -75,7 +75,7 @@ Cryptomator's documentation details its intended [security target](https://docs. - [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) - [:fontawesome-brands-github: Source](https://github.com/cryptomator) It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -216,7 +216,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS*** é o método padrão de criptografia de disco completo para Linux. Ele pode ser usado para criptografar volumes completos, partições ou criar containers criptografados. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/pt/health-and-wellness.md b/i18n/pt/health-and-wellness.md index fb4e4d5f..22de9657 100644 --- a/i18n/pt/health-and-wellness.md +++ b/i18n/pt/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/pt/index.md b/i18n/pt/index.md index 32cc1caa..b7268f5f 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Há pessoas que criticam vários produtos como "não oferecendo privacidade", quando na realidade apenas não oferecem anonimato, por exemplo. Neste site, abordamos os três temas, mas é importante que se compreenda a diferença entre eles, e quando cada um entra em jogo. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/pt/language-tools.md b/i18n/pt/language-tools.md index 8179e04a..48d15dfa 100644 --- a/i18n/pt/language-tools.md +++ b/i18n/pt/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/pt/maps.md b/i18n/pt/maps.md index af77a9bf..1d89262a 100644 --- a/i18n/pt/maps.md +++ b/i18n/pt/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Framadate diff --git a/i18n/pt/meta/admonitions.md b/i18n/pt/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/pt/meta/admonitions.md +++ b/i18n/pt/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md index 44f0e088..b4c13182 100644 --- a/i18n/pt/news-aggregators.md +++ b/i18n/pt/news-aggregators.md @@ -42,9 +42,9 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Suporta os formatos de feeds típicos, juntamente com suporte integrado para feeds do Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE O **Newsboat** é um leitor de feeds RSS/Atom para a consola de texto. É um fork de [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter), e tem atualizações frequentes. It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index 624dcd76..f8f23b61 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -1,7 +1,7 @@ --- title: "Blocos de notas" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Se estiver a utilizar atualmente uma aplicação como o Evernote, o Google Keep ou o Microsoft OneNote, sugerimos que escolha uma alternativa que suporte E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Baseado na nuvem @@ -19,15 +19,17 @@ Se estiver a utilizar atualmente uma aplicação como o Evernote, o Google Keep
-Logótipo Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** é uma aplicação de notas simples e privada, de fácil utilização, e disponível onde quer que esteja. Inclui E2EE em todas as plataformas e uma poderosa experiência de ambiente de trabalho com temas e editores personalizados. Foi também [objeto de uma auditoria independente] (https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Inclui E2EE em todas as plataformas e uma poderosa experiência de ambiente de trabalho com temas e editores personalizados. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Logótipo Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Possui encriptação de ponta a ponta em todas as plataformas e uma sincronização poderosa para que possa escrever as suas notas em qualquer local e dispositivo. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Oferece E2EE e pode ser sincronizada através do Nextcloud, Dropbox e muito mais. Também permite a importação fácil do Evernote e de notas de texto simples. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Também permite a importação fácil do Evernote e de notas de texto simples. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, os seus dados continuam a ser encriptados em trânsito e no local de sincronização, utilizando a sua chave mestra. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, os seus dados continuam a ser encriptados em trânsito e no local de sincronização, utilizando a sua chave mestra. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Logótipo Cryptee](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Logótipo Cryptee](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** é um editor de documentos E2EE de código aberto, baseado na Web, e também uma aplicação de armazenamento de fotografias. O Cryptee é um PWA, o que significa que funciona sem problemas em todos os dispositivos modernos, sem necessitar de aplicações nativas para cada uma das diferentes plataformas. +**Cryptee** é um editor de documentos E2EE de código aberto, baseado na Web, e também uma aplicação de armazenamento de fotografias. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. O registo não requer um e-mail ou outras informações de identificação pessoal. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Aplicações de Notas locais @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Serve para tomar notas, manter listas de tarefas, planear projetos e criar documentos, através de um sistema de texto simples, rápido e eficaz. Permite sincronização com as ferramentas de [sincronização de ficheiros] (file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Serve para tomar notas, manter listas de tarefas, planear projetos e criar documentos, através de um sistema de texto simples, rápido e eficaz. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentação} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuir } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index a364de10..d1296e45 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introdução às palavras-passe :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introdução às palavras-passe :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Os gestores de palavras-passe integrados em software, como browsers e sistemas operativos, não são, por vezes, tão bons como o software dedicado de gestão de palavras-passe. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Por exemplo, o gestor de palavras-passe no Microsoft Edge não oferece E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Estes gestores de palavras-passe sincronizam as suas palavras-passe com um servi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. O seu cofre 1Password é protegido com a sua palavra-passe mestra e uma chave de segurança aleatória de 34 caracteres, de forma a encriptar os seus dados nos seus servidores. Esta chave de segurança acrescenta uma camada de proteção aos seus dados, uma vez que estes são protegidos com elevada entropia, independentemente da sua palavra-passe mestra. Para proteger os seus dados, muitas outras soluções de gestão de palavras-passe dependem inteiramente da força da sua palavra-passe mestra. @@ -276,7 +278,7 @@ O seu cofre 1Password é protegido com a sua palavra-passe mestra e uma chave de - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Estas opções permitem-lhe gerir localmente uma base de dados de palavras-passe - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w ### Critérios -**Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si. +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. - Devem ser multiplataforma. diff --git a/i18n/pt/pastebins.md b/i18n/pt/pastebins.md index a3db984a..1dd79b8a 100644 --- a/i18n/pt/pastebins.md +++ b/i18n/pt/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Os dados são encriptados/desencriptados no browser utilizando AES de 256 bits. É a versão melhorada do ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Os dados são encriptados/desencriptados no browser utilizando AES de 256 bits. É a versão melhorada do ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Requisitos mínimos - Deve ser de fonte aberta. -- Devem implementar uma encriptação de ponta a ponta de "confiança zero". +- Must implement "zero-trust" E2EE. - Devem suportar ficheiros protegidos por palavra-passe. ### Melhor caso Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. -- Devem ter uma auditoria publicada por um terceiro independente e de boa reputação. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pt/photo-management.md b/i18n/pt/photo-management.md index c2e27913..236b4731 100644 --- a/i18n/pt/photo-management.md +++ b/i18n/pt/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Requisitos mínimos -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Melhor caso -- Devem ter uma auditoria publicada por um terceiro independente e de boa reputação. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/pt/privacy.md b/i18n/pt/privacy.md index eeaa7df4..a743766b 100644 --- a/i18n/pt/privacy.md +++ b/i18n/pt/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index ef364cc2..9e2628d9 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Aplicações de mensagens encriptadas diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index 1e6f1efd..9ab8f339 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index 27643371..5b753f7e 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Logótipo Tor](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -O **Browser Tor** é a escolha certa se precisar de anonimato, uma vez que lhe dá acesso à rede Tor e às sua bridges, e inclui definições por defeito e extensões que são automaticamente configuradas com níveis de segurança predefinidos: *Standard*, *Seguro* e *Máxima Segurança*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ O **Browser Tor** é a escolha certa se precisar de anonimato, uma vez que lhe d
-O Tor foi concebido para evitar a recolha de impressões digitais, ou a sua identificação com base na configuração. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +O Tor foi concebido para evitar a recolha de impressões digitais, ou a sua identificação com base na configuração. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index 691e9ec4..6e6d9135 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -145,8 +145,9 @@ O **IVPN** é outro fornecedor de VPN premium, e está em funcionamento desde 20 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/ru/about/donation-acceptance-policy.md b/i18n/ru/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/ru/about/donation-acceptance-policy.md +++ b/i18n/ru/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/ru/advanced/communication-network-types.md b/i18n/ru/advanced/communication-network-types.md index 837d62f9..73b78a1e 100644 --- a/i18n/ru/advanced/communication-network-types.md +++ b/i18n/ru/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: Обзор нескольких сетевых архитектур Существует несколько сетевых архитектур, обычно используемых для передачи сообщений между людьми. Эти сети могут предоставлять разные гарантии конфиденциальности, поэтому при принятии решения о том, какое приложение использовать, стоит учитывать вашу [модель угроз](../basics/threat-modeling.md). -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Централизованные сети diff --git a/i18n/ru/advanced/tor-overview.md b/i18n/ru/advanced/tor-overview.md index cf11a6db..4774258b 100644 --- a/i18n/ru/advanced/tor-overview.md +++ b/i18n/ru/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor - это бесплатная в использовании д [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. При правильном использовании сеть позволяет осуществлять частный и анонимный браузинг и общение. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Построение пути к сервисам Clearnet @@ -137,7 +137,7 @@ Those at risk of browser vulnerabilities should consider additional protections "Сервисы Onion" (также часто называемые "скрытыми сервисами") - это веб-сайты, доступ к которым возможен только через браузер Tor. Эти сайты имеют длинное случайно сгенерированное доменное имя, заканчивающееся на `.onion`. -Подключение к сервису Onion в Tor работает аналогично подключению к сервису clearnet, но ваш трафик проходит в общей сложности через **шесть узлов**, прежде чем достигнет сервера назначения. Однако, как и раньше, только три из этих узлов способствуют *вашей* анонимности, остальные три узла защищают анонимность *сервисов Onion*, скрывая истинный IP и местоположение сайта так же, как Tor Browser скрывает ваш. +Подключение к сервису Onion в Tor работает аналогично подключению к сервису clearnet, но ваш трафик проходит в общей сложности через **шесть узлов**, прежде чем достигнет сервера назначения. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Путь Tor, показывающий, что ваш трафик направляется через три ваших Tor-узла плюс три дополнительных Tor-узла, скрывающих идентичность сайта](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Those at risk of browser vulnerabilities should consider additional protections ## Шифрование -Tor шифрует каждый пакет (блок передаваемых данных) три раза с помощью ключей от выходного, среднего и входного узла - именно в таком порядке. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. После того как Tor построил цепь, передача данных осуществляется следующим образом: -1. Во-первых: когда пакет поступает на входной узел, первый уровень шифрования снимается. В этом зашифрованном пакете входной узел найдет другой зашифрованный пакет с адресом среднего узла. Затем входной узел пересылает пакет среднему узлу. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. В этом зашифрованном пакете входной узел найдет другой зашифрованный пакет с адресом среднего узла. Затем входной узел пересылает пакет среднему узлу. -2. Во-вторых: когда средний узел получает пакет от входного узла, он тоже снимает слой шифрования своим ключом, и на этот раз находит зашифрованный пакет с адресом выходного узла. Затем средний узел пересылает пакет на выходной узел. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. Затем средний узел пересылает пакет на выходной узел. -3. И последнее: когда выходной узел получает свой пакет, он удаляет последний уровень шифрования своим ключом. Выходной узел увидит адрес назначения и перешлет пакет на этот адрес. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. Выходной узел увидит адрес назначения и перешлет пакет на этот адрес. Ниже приведена альтернативная диаграмма, показывающая этот процесс. Каждый узел снимает свой собственный уровень шифрования, а когда сервер назначения возвращает данные, тот же процесс происходит полностью в обратном порядке. Например, выходной узел не знает, кто вы, но он знает, с какого узла пришло сообщение, поэтому он добавляет свой собственный уровень шифрования и отправляет его обратно. @@ -185,7 +185,7 @@ Tor позволяет нам подключаться к серверу так, Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: Первый ретранслятор в вашей цепи называется "входным" или "охранным". Это быстрый и стабильный ретранслятор, который остается первым в вашей цепи в течение 2-3 месяцев для защиты от известной атаки, нарушающей анонимность. Остальная часть цепи меняется с каждым новым посещаемым сайтом, и все вместе эти реле обеспечивают полную защиту конфиденциальности Tor. Более подробную информацию о том, как работают охранные ретрансляторы, можно найти в этом [посте в блоге](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) и [документе](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) о входных узлах. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: Первый ретранслятор в вашей цепи называется "входным" или "охранным". Это быстрый и стабильный ретранслятор, который остается первым в вашей цепи в течение 2-3 месяцев для защиты от известной атаки, нарушающей анонимность. Остальная часть цепи меняется с каждым новым посещаемым сайтом, и все вместе эти реле обеспечивают полную защиту конфиденциальности Tor. Более подробную информацию о том, как работают охранные ретрансляторы, можно найти в этом [посте в блоге](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) и [документе](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) о входных узлах. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Флаг ретраслятора: специальная (дис)квалификация реле для позиций цепи (например, "Guard", "Exit", "BadExit"), свойств цепи (например, "Fast", "Stable") или ролей (например, "Authority", "HSDir"), назначаемых владельцами директории и далее определенных в спецификации протокола директории. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Флаг ретраслятора: специальная (дис)квалификация реле для позиций цепи (например, "Guard", "Exit", "BadExit"), свойств цепи (например, "Fast", "Stable") или ролей (например, "Authority", "HSDir"), назначаемых владельцами директории и далее определенных в спецификации протокола директории. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/ru/ai-chat.md b/i18n/ru/ai-chat.md index 3659fc44..0c1104c7 100644 --- a/i18n/ru/ai-chat.md +++ b/i18n/ru/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/ru/alternative-networks.md b/i18n/ru/alternative-networks.md index c59700a8..47ba9b98 100644 --- a/i18n/ru/alternative-networks.md +++ b/i18n/ru/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ru/android/general-apps.md b/i18n/ru/android/general-apps.md index 782836fc..038aea9b 100644 --- a/i18n/ru/android/general-apps.md +++ b/i18n/ru/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/ru/basics/vpn-overview.md b/i18n/ru/basics/vpn-overview.md index ecf499a2..783d39d1 100644 --- a/i18n/ru/basics/vpn-overview.md +++ b/i18n/ru/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Нужен ли вам VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Нужен ли вам VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md index 43c2aff9..c0611616 100644 --- a/i18n/ru/basics/why-privacy-matters.md +++ b/i18n/ru/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: Ваша приватность никогда не была сто Многие люди путают **приватность**, **безопасность** и **анонимность**. Вы можете видеть, как люди называют различные продукты "не приватными", когда на самом деле они имеют в виду, что эти продукты не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру. -[:material-movie-open-play-outline: Видео: Перестаньте путать приватность, анонимность и безопасность](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Видео: Перестаньте путать приватность, анонимность и безопасность](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Приватность** @@ -58,7 +58,7 @@ description: Ваша приватность никогда не была сто Приватность должна быть встроена по умолчанию в [программы и сервисы](../tools.md), которые мы используем, у вас нет возможности самостоятельно настроить большинство приложений на приватность. -[:material-movie-open-play-outline: Видео: 5 способов повысить вашу конфиденциальность {](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/) class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Источники diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index 3634f07b..c9e164b8 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Пассивные атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Поставщики услуг](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. Альтернативы, перечисленные ниже, устраняют необходимость в доверии путем внедрения безопасного E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Если эти альтернативы не соответствуют вашим потребностям, мы предлагаем вам рассмотреть возможность использования программного обеспечения для шифрования, например, [Cryptomator](encryption.md#cryptomator-cloud) с другими облачными хранилищами. Использование Cryptomator в сочетании с **любым** облачным хранилищем (включая эти) может быть хорошей идеей для снижения риска ошибок шифрования в собственных клиентах провайдера. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a
-Компания Tresorit прошла ряд независимых аудитов безопасности: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,7 +84,9 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a - Computest обнаружил две уязвимости, которые были устранены. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - В данном обзоре был проанализирован весь исходный код Tresorit и было подтверждено, что реализация соответствует концепциям, описанным в [техническом документе](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) Tresorit. - - Компания Ernst & Young дополнительно протестировала веб-приложение, мобильные и настольные клиенты: "Результаты тестирования не выявили никаких отклонений от заявлений Tresorit о конфиденциальности данных." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Минимальные требования -- Должны использовать обязательное сквозное шифрование. +- Must enforce E2EE. - Должны иметь бесплатную версию или пробный период для тестирования. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Должны иметь веб-интерфейс, поддерживающий основные функции управления файлами. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. - Clients should be open source. -- Клиенты должны быть полностью проверены независимой третьей стороной. +- Clients should be audited in their entirety by an independent third party. - Должны предлагать нативные клиенты для Linux, Android, Windows, macOS и iOS. - Эти клиенты должны интегрироваться с собственными инструментами ОС для сервисов облачных хранилищ, такими как интеграция приложения Files на iOS или функциональность DocumentsProvider на Android. -- Должны поддерживать простой обмен файлами с другими пользователями. +- Should support easy file sharing with other users. - Должны предлагать, по крайней мере, базовые функции предварительного просмотра и редактирования файлов в веб-интерфейсе. [^1]: Соотвествие стандарту [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 относится к [системе управления информационной безопасностью](https://en.wikipedia.org/wiki/Information_security_management) компании и распространяется на продажу, разработку, обслуживание и поддержку облачных услуг. diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index b0c1198b..3880ecd9 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -34,7 +34,7 @@ cover: data-redaction.webp
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ cover: data-redaction.webp **ExifEraser** - это современное приложение, не требующее разрешений, для удаления метаданных изображений для Android. -В настоящее время он поддерживает файлы JPEG, PNG и WebP. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md index c0cf7749..23258020 100644 --- a/i18n/ru/desktop-browsers.md +++ b/i18n/ru/desktop-browsers.md @@ -91,7 +91,7 @@ schema: Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Если ты хочешь более комплексно настроить браузер и цифровые отпечатки тебя не волнуют, то мы рекомендуем использовать [Firefox](#firefox). diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index 2d459665..52dcbf16 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -24,8 +24,8 @@ cover: desktop.webp **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. Эти новые технологии часто улучшают безопасность, конфиденциальность и удобство использования в целом. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora имеет \[полу-плавающий\](https://ru.wikipedia.org/wiki/ openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed следует модели плавающего релиза, ког **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. Более подробную информацию можно найти на их сайте [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS - это независимый дистрибутив, основанный на пакетном менеджере Nix с акцентом на воспроизводимость и надежность. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" } @@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** - это операционная система, основанная на Debian и направляющая все коммуникации через Tor, которая может загружаться практически на любом компьютере с DVD или USB-накопителя или SD-карты. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/ru/dns.md b/i18n/ru/dns.md index c29f9218..06720877 100644 --- a/i18n/ru/dns.md +++ b/i18n/ru/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ru/document-collaboration.md b/i18n/ru/document-collaboration.md index 30e0f151..aa2ceab9 100644 --- a/i18n/ru/document-collaboration.md +++ b/i18n/ru/document-collaboration.md @@ -54,7 +54,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index e4d5a4fb..41e8bf74 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** - это маленькая и простая программа, предоставляющая современное шифрование. Picocrypt использует безопасный шифр XChaCha20 и функцию формирования ключа Argon2id для обеспечения высокого уровня безопасности. Для функций шифрования он использует стандартные модули Go x/crypto. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** - это стандартный метод FDE для Linux. Его можно использовать для шифрования полных томов, разделов или создания зашифрованных контейнеров. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/ru/health-and-wellness.md b/i18n/ru/health-and-wellness.md index f33e530e..91677e13 100644 --- a/i18n/ru/health-and-wellness.md +++ b/i18n/ru/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/ru/index.md b/i18n/ru/index.md index bf4d9db2..079c5dd1 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Вы можете видеть, как люди называют различные продукты "не приватными", когда на самом деле они имеют в виду, что эти продукты не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру. -[:material-movie-open-play-outline: Видео: 5 способов повысить вашу конфиденциальность](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/ru/language-tools.md b/i18n/ru/language-tools.md index 74a5e1f8..13400e94 100644 --- a/i18n/ru/language-tools.md +++ b/i18n/ru/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/ru/maps.md b/i18n/ru/maps.md index 6e26e9c9..31c1a657 100644 --- a/i18n/ru/maps.md +++ b/i18n/ru/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Критерии diff --git a/i18n/ru/meta/admonitions.md b/i18n/ru/meta/admonitions.md index f77c6d36..ac977a3e 100644 --- a/i18n/ru/meta/admonitions.md +++ b/i18n/ru/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/ru/news-aggregators.md b/i18n/ru/news-aggregators.md index e244e959..4f652a66 100644 --- a/i18n/ru/news-aggregators.md +++ b/i18n/ru/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Он поддерживает типичные форматы лент, а также встроенную поддержку лент Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** - это программа для чтения RSS/Atom-лент в текстовой консоли. Это активно поддерживаемый форк [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-Чтобы подписаться на YouTube-канал с помощью RSS-клиента, сначала найдите [идентификатор канала](https://support.google.com/youtube/answer/6180214?hl=ru). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +Чтобы подписаться на YouTube-канал с помощью RSS-клиента, сначала найдите [идентификатор канала](https://support.google.com/youtube/answer/6180214?hl=ru). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index c4c18f59..fc52a5c9 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -1,7 +1,7 @@ --- title: "Заметки" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Если вы в настоящее время используете такие приложения, как Evernote, Google Keep или Microsoft OneNote, то мы предлагаем вам выбрать альтернативу с поддержкой E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Облачные сервисы @@ -19,15 +19,17 @@ Keep track of your notes and journals without giving them to a third party.
-![Логотип Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** - это простое и приватное приложение для заметок, которое делает ваши заметки легкими и доступными везде, где бы вы ни находились. Приложение имеет E2EE на каждой платформе и продвинутый функционал с темами и кастомными редакторами для ПК. Он также прошел [независимый аудит](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Приложение имеет E2EE на каждой платформе и продвинутый функционал с темами и кастомными редакторами для ПК. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Keep track of your notes and journals without giving them to a third party. - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. В нем реализовано сквозное шифрование на всех платформах и мощная синхронизация, позволяющая делать заметки на ходу. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Приложение предлагает E2EE и может синхронизироваться через Nextcloud, Dropbox и др. Приложение также предлагает легкий перенос данных из Evernote и простых текстовых заметок. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Приложение также предлагает легкий перенос данных из Evernote и простых текстовых заметок. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Но ваши данные по-прежнему шифруются вашим секретным ключом при передаче и в месте синхронизации. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Но ваши данные по-прежнему шифруются вашим секретным ключом при передаче и в месте синхронизации. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Логотип Cryptee](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Логотип Cryptee](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** - это веб-редактор документов и приложение для хранения фотографий с поддержкой E2EE и открытым исходным кодом. Cryptee - это PWA, что означает, что он работает без проблем на всех современных устройствах, не требуя нативных приложений для каждой соответствующей платформы. +**Cryptee** - это веб-редактор документов и приложение для хранения фотографий с поддержкой E2EE и открытым исходным кодом. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Регистрация не требует указания электронной почты или другой персональной информации. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Локальные сервисы @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode предназначен для ведения заметок, to-do листов, планирования проектов и создания документов с помощью быстрой и эффективной системы работы с обычным текстом. Синхронизация возможна с помощью программ для [синхронизации файлов](file-sharing.md#синхронизация-файлов). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode предназначен для ведения заметок, to-do листов, планирования проектов и создания документов с помощью быстрой и эффективной системы работы с обычным текстом. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Домашняя страница](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Документация} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 6d4e4341..5eeb3290 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Введение в безопасные пароли :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Введение в безопасные пароли :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Инфо.

Встроенные менеджеры паролей, например в браузерах и операционных системах, иногда не так хороши, как специализированные программы для управления паролями. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Например, менеджер паролей в Microsoft Edge вообще не поддерживает E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ schema: - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Ваше хранилище 1Password защищено одновременно мастер-паролем и случайным 34-символьным ключом безопасности для шифрования данных на серверах. Этот ключ добавляет вашим данным дополнительную защиту: они зашифрованы с высокой энтропией независимо от безопасности вашего мастер-пароля. Многие другие решения для управления паролями полностью полагаются на безопасность мастер-пароля для защиты ваших данных. @@ -276,7 +278,7 @@ Traditionally, 1Password has offered the best password manager user experience f - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC хранит экспортированные данные в виде ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC хранит экспортированные данные в виде +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ KeePassXC хранит экспортированные данные в виде ### Критерии -**Обратите внимание, что у нас нет связей ни с одним из проектов, которые мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md)мы разработали четкий набор требований, позволяющий нам давать объективные рекомендации. Мы рекомендуем вам ознакомиться с этим списком, прежде чем выбрать программу, и провести самостоятельное исследование, чтобы убедиться, что это правильный выбор для вас. +**Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Перед тем, как вы решите выбрать какой-либо проект, мы рекомендуем вам ознакомиться со списком критериев и провести собственное исследование, чтобы убедиться в правильности своего выбора. - Программа должна быть кроссплатформенной. diff --git a/i18n/ru/pastebins.md b/i18n/ru/pastebins.md index 6e1c87ff..61ddb854 100644 --- a/i18n/ru/pastebins.md +++ b/i18n/ru/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Данные шифруются/дешифруются в браузере с помощью 256-битного AES. Это улучшенная версия ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Данные шифруются/дешифруются в браузере с помощью 256-битного AES. Это улучшенная версия ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Минимальные требования к сервисам - Исходный код проекта должен быть открыт. -- Должно быть реализовано сквозное шифрование "с нулевым доверием". +- Must implement "zero-trust" E2EE. - Должен поддерживать файлы, защищенные паролем. ### В лучшем случае Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. -- Должен иметь опубликованный аудит от авторитетной, независимой третьей стороны. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ru/photo-management.md b/i18n/ru/photo-management.md index 95274aef..34cb31ab 100644 --- a/i18n/ru/photo-management.md +++ b/i18n/ru/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Минимальные требования к сервисам -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Должны иметь бесплатную версию или пробный период для тестирования. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Должны иметь веб-интерфейс, поддерживающий основные функции управления файлами. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### В лучшем случае -- Должен иметь опубликованный аудит от авторитетной, независимой третьей стороны. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/ru/privacy.md b/i18n/ru/privacy.md index f1641969..91b655ae 100644 --- a/i18n/ru/privacy.md +++ b/i18n/ru/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index 9077be45..726358ed 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Зашифрованные мессенджеры diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index cc0761c8..2f2d025f 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index 8a128cf7..20c33a78 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Логотип Tor Browser](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** - это выбор, если тебе нужна анонимность, поскольку он предоставляет доступ к сети Tor и мостам, а также включает в себя настройки и расширения, которые автоматически конфигурируются по выбранным уровням безопасности: *Обычный*, *Высокий* и *Высший*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ If more complete anonymity is paramount to your situation, you should **only** b
-Браузер Tor предназначен для предотвращения "отпечатков браузера", или идентификации тебя на основе конфигурации твоего браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Браузер Tor предназначен для предотвращения "отпечатков браузера", или идентификации тебя на основе конфигурации твоего браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index 9e5fcfe5..9d190d6a 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -145,8 +145,9 @@ We are noting this because while we don't necessarily recommend against sharing Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/sv/about/donation-acceptance-policy.md b/i18n/sv/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/sv/about/donation-acceptance-policy.md +++ b/i18n/sv/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/sv/advanced/communication-network-types.md b/i18n/sv/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/sv/advanced/communication-network-types.md +++ b/i18n/sv/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index d1c1bc0d..29c1ff63 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor är ett decentraliserat nätverk som är gratis att använda oc [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Om nätverket används på rätt sätt möjliggör det privat och anonym surfning och kommunikation. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] Du → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - Du → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Kryptering -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ Om du vill använda Tor för att surfa på webben rekommenderar vi endast den of Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: Det första reläet i din krets kallas "entry guard" eller "guard". Det är ett snabbt och stabilt relä som förblir det första i din krets i 2-3 månader för att skydda mot en känd attack som bryter anonymiteten. Resten av din krets ändras med varje ny webbplats du besöker, och alla dessa reläer ger Tor: s fullständiga integritetsskydd. För mer information om hur skyddsreläer fungerar, se detta [blogginlägg](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) och [papper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) på ingångsvakter. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: Det första reläet i din krets kallas "entry guard" eller "guard". Det är ett snabbt och stabilt relä som förblir det första i din krets i 2-3 månader för att skydda mot en känd attack som bryter anonymiteten. Resten av din krets ändras med varje ny webbplats du besöker, och alla dessa reläer ger Tor: s fullständiga integritetsskydd. För mer information om hur skyddsreläer fungerar, se detta [blogginlägg](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) och [papper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) på ingångsvakter. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Reläflagga: en särskild (diskvalificering) av reläer för kretslägen (t.ex. "Guard", "Exit", "BadExit"), kretsegenskaper (t.ex. "Fast", "Stable") eller roller (t.ex. "Authority", "HSDir") som tilldelats av katalogmyndigheterna och som definieras ytterligare i specifikationen för katalogprotokollet. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Reläflagga: en särskild (diskvalificering) av reläer för kretslägen (t.ex. "Guard", "Exit", "BadExit"), kretsegenskaper (t.ex. "Fast", "Stable") eller roller (t.ex. "Authority", "HSDir") som tilldelats av katalogmyndigheterna och som definieras ytterligare i specifikationen för katalogprotokollet. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/sv/ai-chat.md b/i18n/sv/ai-chat.md index 6e721db7..7626f8ae 100644 --- a/i18n/sv/ai-chat.md +++ b/i18n/sv/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/sv/alternative-networks.md b/i18n/sv/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/sv/alternative-networks.md +++ b/i18n/sv/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/sv/android/general-apps.md b/i18n/sv/android/general-apps.md index c6610774..4883a4be 100644 --- a/i18n/sv/android/general-apps.md +++ b/i18n/sv/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/sv/basics/vpn-overview.md b/i18n/sv/basics/vpn-overview.md index 1ed75974..d2f25ae5 100644 --- a/i18n/sv/basics/vpn-overview.md +++ b/i18n/sv/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md index 67ac4171..52b060d8 100644 --- a/i18n/sv/basics/why-privacy-matters.md +++ b/i18n/sv/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Källor diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index aad7c3d6..9e3fb457 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passiva attacker](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Tjänsteleverantörer](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimikrav -- Måste genomdriva end-to-end-kryptering. +- Must enforce E2EE. - Måste erbjuda en gratis plan eller provperiod för testning. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Måste erbjuda ett webbgränssnitt som stöder grundläggande filhanteringsfunktioner. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. - Clients should be open source. -- Klienterna bör granskas i sin helhet av en oberoende tredje part. +- Clients should be audited in their entirety by an independent third party. - De bör erbjuda inhemska klienter för Linux, Android, Windows, macOS och iOS. - Dessa klienter bör integreras med operativsystemets verktyg för leverantörer av molnlagring, t. ex. integrering av Files-appen i iOS eller DocumentsProvider-funktionen i Android. -- Det bör vara enkelt att dela filer med andra användare. +- Should support easy file sharing with other users. - Bör erbjuda åtminstone grundläggande funktioner för förhandsgranskning och redigering av filer i webbgränssnittet. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index 4830cc9a..b9fa15a9 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -34,7 +34,7 @@ Du bör **aldrig** använda oskärpa för att redigera [text i bilder] (https://
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Du bör **aldrig** använda oskärpa för att redigera [text i bilder] (https:// **ExifEraser** är ett modernt program för radering av bildmetadata för Android, utan behörighet. -För närvarande stöds JPEG-, PNG- och WebP-filer. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index 11a3202f..136f7ea7 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -91,7 +91,7 @@ Om du vill surfa anonymt på internet bör du använda [Tor](tor.md) i stället. Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index 94ac88e5..7d2be13e 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" } @@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index cb337400..41fb4bb4 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/sv/document-collaboration.md b/i18n/sv/document-collaboration.md index ec4d692b..eaee5e34 100644 --- a/i18n/sv/document-collaboration.md +++ b/i18n/sv/document-collaboration.md @@ -54,7 +54,7 @@ Vi rekommenderar inte att du använder [E2EE App](https://apps.nextcloud.com/app ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index 74e546c6..fd72ada9 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** är ett litet och enkelt krypteringsverktyg som tillhandahåller modern kryptering. Picocrypt använder den säkra XChaCha20-chiffern och Argon2id-nyckelderivatfunktionen för att ge en hög säkerhetsnivå. Det använder Go standard x/crypto moduler för sina krypteringsfunktioner. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** är standardmetoden för FDE för Linux. Den kan användas för att kryptera hela volymer, partitioner eller skapa krypterade behållare. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/sv/health-and-wellness.md b/i18n/sv/health-and-wellness.md index cc68df0e..6bc6cb5c 100644 --- a/i18n/sv/health-and-wellness.md +++ b/i18n/sv/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/sv/index.md b/i18n/sv/index.md index b00b5cf9..285d4ef1 100644 --- a/i18n/sv/index.md +++ b/i18n/sv/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/sv/language-tools.md b/i18n/sv/language-tools.md index 9e37e11f..6dbb6ab7 100644 --- a/i18n/sv/language-tools.md +++ b/i18n/sv/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/sv/maps.md b/i18n/sv/maps.md index ef677dbc..8755b910 100644 --- a/i18n/sv/maps.md +++ b/i18n/sv/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Kriterier diff --git a/i18n/sv/meta/admonitions.md b/i18n/sv/meta/admonitions.md index 566ca8de..8095001c 100644 --- a/i18n/sv/meta/admonitions.md +++ b/i18n/sv/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/sv/news-aggregators.md b/i18n/sv/news-aggregators.md index 2271dfa9..2642da0a 100644 --- a/i18n/sv/news-aggregators.md +++ b/i18n/sv/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,12 +87,14 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. -[:octicons-home-16: Hemsida](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Dokumentation" } -[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Källkod" } -[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Bidra" } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } +[:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. Den stödjer de vanligaste formaten tillsammans med inbyggd support för flöden från Reddit. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Hemsida](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Integritetspolicy" } @@ -125,9 +131,9 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** är en RSS/Atom-flödesläsare för textkonsolen. Det är en aktivt underhållen gaffel av [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). -[:octicons-home-16: Hemsida](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Dokumentation" } -[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Källkod" } +[:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index 6e6ada3c..d12056c2 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -1,7 +1,7 @@ --- title: "Anteckningsböcker" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Om du för närvarande använder ett program som Evernote, Google Keep eller Microsoft OneNote föreslår vi att du väljer ett alternativ som stöder E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Molnbaserad @@ -21,13 +21,15 @@ Om du för närvarande använder ett program som Evernote, Google Keep eller Mic ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** är en enkel och privat anteckningsapp som gör dina anteckningar enkla och tillgängliga överallt. Den har E2EE på alla plattformar och en kraftfull skrivbordsupplevelse med teman och anpassade redaktörer. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Den har E2EE på alla plattformar och en kraftfull skrivbordsupplevelse med teman och anpassade redaktörer. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Om du för närvarande använder ett program som Evernote, Google Keep eller Mic - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Det erbjuder E2EE och kan synkroniseras via Nextcloud, Dropbox och mer. Det erbjuder också enkel import från Evernote och vanlig text anteckningar. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Det erbjuder också enkel import från Evernote och vanlig text anteckningar. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dina data är dock fortfarande krypterade under överföring och på synkroniseringsplatsen med hjälp av huvudnyckeln. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dina data är dock fortfarande krypterade under överföring och på synkroniseringsplatsen med hjälp av huvudnyckeln. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee-logotyp](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** är en webbaserad E2EE-dokumentredigerare med öppen källkod och ett program för lagring av foton. Cryptee är en PWA, vilket innebär att den fungerar smidigt på alla moderna enheter utan att kräva inbyggda appar för varje plattform. +**Cryptee** är en webbaserad E2EE-dokumentredigerare med öppen källkod och ett program för lagring av foton. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. För att registrera dig krävs ingen e-post eller annan personligt identifierbar information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Lokala anteckningsböcker @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synkronisering är möjlig med [filsynkronisering](file-sharing.md#file-sync)-verktyg. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index 41c0ef15..35e816ab 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduktion till lösenord :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduktion till lösenord :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Inbyggda lösenordshanterare i programvaror som webbläsare och operativsystem är ibland inte lika bra som en särskild programvara för lösenordshantering. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Lösenordshanteraren i Microsoft Edge erbjuder till exempel inte alls E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Dessa lösenordshanterare synkroniserar dina lösenord till en molnserver så at - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Hemsida](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Integritetspolicy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Ditt 1Password-valv är skyddat med både ditt huvudlösenord och en slumpmässig 34-teckig säkerhetsnyckel för att kryptera dina data på deras servrar. Den här säkerhetsnyckeln ger dina data ett extra skydd eftersom dina data är säkrade med hög entropi oavsett huvudlösenordet. Många andra lösenordshanteringslösningar är helt beroende av styrkan i ditt huvudlösenord för att säkra dina data. @@ -276,7 +278,7 @@ Ditt 1Password-valv är skyddat med både ditt huvudlösenord och en slumpmässi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ Med dessa alternativ kan du hantera en krypterad lösenordsdatabas lokalt. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,12 +348,12 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. -[:octicons-home-16: Hemsida](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Dokumentation" } -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Källkod" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Bidra" } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -363,6 +365,8 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/sv/pastebins.md b/i18n/sv/pastebins.md index 1199b2b7..ffa386c8 100644 --- a/i18n/sv/pastebins.md +++ b/i18n/sv/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimikrav - Måste vara öppen källkod. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Bästa fall Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/sv/photo-management.md b/i18n/sv/photo-management.md index f2643d88..c0f73065 100644 --- a/i18n/sv/photo-management.md +++ b/i18n/sv/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimikrav -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Måste erbjuda en gratis plan eller provperiod för testning. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Måste erbjuda ett webbgränssnitt som stöder grundläggande filhanteringsfunktioner. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Bästa fall -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/sv/privacy.md b/i18n/sv/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/sv/privacy.md +++ b/i18n/sv/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index e33ee6fc..2674211e 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index a8bd046a..faa1c009 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index 12c6a2e8..b7048402 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 61c9ab0e..e9517b1d 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/tr/about/donation-acceptance-policy.md b/i18n/tr/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/tr/about/donation-acceptance-policy.md +++ b/i18n/tr/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/tr/advanced/communication-network-types.md b/i18n/tr/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/tr/advanced/communication-network-types.md +++ b/i18n/tr/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/tr/advanced/tor-overview.md b/i18n/tr/advanced/tor-overview.md index c846d08f..53f45940 100644 --- a/i18n/tr/advanced/tor-overview.md +++ b/i18n/tr/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/tr/ai-chat.md b/i18n/tr/ai-chat.md index 359d19d2..2b683f12 100644 --- a/i18n/tr/ai-chat.md +++ b/i18n/tr/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/tr/alternative-networks.md b/i18n/tr/alternative-networks.md index dba47492..5a18664a 100644 --- a/i18n/tr/alternative-networks.md +++ b/i18n/tr/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/tr/android/general-apps.md b/i18n/tr/android/general-apps.md index 5a49602e..e84ab933 100644 --- a/i18n/tr/android/general-apps.md +++ b/i18n/tr/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/tr/basics/vpn-overview.md b/i18n/tr/basics/vpn-overview.md index 892d12ba..6d2443c5 100644 --- a/i18n/tr/basics/vpn-overview.md +++ b/i18n/tr/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Sanal Özel Ağlar, riski İnternet Sağlayıcınızdan alıp güve Sanal Özel Ağlar, ağınızın ucunu dünyanın başka bir yerinden çıkmak üzere genişletmenin bir yoludur. -[:material-movie-open-play-outline: Video: VPN'e ihtiyacınız var mı?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: VPN'e ihtiyacınız var mı?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normalde bir İSS, ağ sonlandırma cihazınıza (yani modeminize) giren ve çıkan internet trafiğinin akışını görebilir. HTTPS gibi şifreleme protokolleri internette yaygın olarak kullanılmaktadır, bu nedenle tam olarak ne gönderdiğinizi veya okuduğunuzu göremeyebilirler, ancak [talep ettiğiniz alan adları](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) hakkında bir fikir edinebilirler. diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md index 2d4e53d3..b2aa0e58 100644 --- a/i18n/tr/basics/why-privacy-matters.md +++ b/i18n/tr/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Mahremiyet nihayetinde insan bilgisiyle ilgilidir ve bu önemlidir çünkü insa Birçok kişi **gizlilik**, **güvenlik**ve **anonimlik** kavramlarını birbiriyle karıştırmaktadır. Örneğin, insanların çeşitli ürünleri "gizli olmadığı" gerekçesi ile eleştirdiğini görürsünüz, oysaki demek istedikleri anonim sağlamadıklarıdır. Bu sitede üç konuyu da ele alıyoruz, ancak bunların arasındaki farkı ve her birinin ne zaman devreye girdiğini anlamanız önemlidir. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Gizililiğin yaygın tanımlarından birisi verilerinize kimin erişebileceğini Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Kaynaklar diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index 25100502..1e5c29c5 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Pasif Saldırılar](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. Aşağıda listelenen alternatifler güvenli uçtan uca şifreleme uygulayarak güven ihtiyacını ortadan kaldırır. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. Bu alternatifler ihtiyaçlarınızı karşılamıyorsa, başka bir bulut sağlayıcısıyla birlikte [Cryptomator](encryption.md#cryptomator-cloud) gibi bir şifreleme yazılımı kullanmanızı öneririz. Cryptomator'ı **herhangi bir ** bulut sağlayıcısıyla kullanmak (listenenenler dahil) sağlayıcının yerel istemcilerindeki şifreleme kusurlarını azaltmak için iyi bir fikir olabilir. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Gereksinimler -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November En iyi durum kriterlerimiz, bu kategorideki mükemmel bir projede görmek istediklerimizi temsil etmektedir. Önerilerimiz bu işlevlerden herhangi birini veya tamamını içermeyebilir, ancak içerenler bu sayfada diğerlerinden daha üst sıralarda yer alabilir. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index c63fad67..344f8db4 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -32,9 +32,9 @@ Görüntülerdeki metinleri] düzenlemek için bulanıklaştırmayı **asla** ku [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Kaynak Kod" }
-İndirmeler +Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,11 +51,11 @@ Görüntülerdeki metinleri] düzenlemek için bulanıklaştırmayı **asla** ku **ExifEraser** Android için modern, izinsiz bir görüntü meta veri silme uygulamasıdır. -Şu anda JPEG, PNG ve WebP dosyalarını desteklemektedir. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Kaynak Kod" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
İndirmeler diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md index b358dc11..36950304 100644 --- a/i18n/tr/desktop-browsers.md +++ b/i18n/tr/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. Tarayıcınızı daha fazla yapılandırmak istiyorsanız ve parmak izi sizin için bir endişe kaynağı değilse, bunun yerine [Firefox](#firefox) öneririz. diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index ca78ff4e..31b482ce 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. Bu yeni teknolojiler genellik güvenlik, gizlilik ve kullanılabilirlik iyileştirmeleriyle gelir. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" } @@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/tr/dns.md b/i18n/tr/dns.md index aff0aa39..7df293e9 100644 --- a/i18n/tr/dns.md +++ b/i18n/tr/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/tr/document-collaboration.md b/i18n/tr/document-collaboration.md index 585324e5..535ca918 100644 --- a/i18n/tr/document-collaboration.md +++ b/i18n/tr/document-collaboration.md @@ -54,7 +54,7 @@ Veri kaybına yol açabileceğinden Nextcloud için [E2EE App](https://apps.next ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index 971879e5..203ce147 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -64,9 +64,9 @@ Cryptomator'ın dokümantasyonu, amaçlanan [güvenlik hedefini](https://docs.cr **Picocrypt** modern şifreleme sağlayan küçük ve basit bir şifreleme aracıdır. Picocrypt, yüksek düzeyde güvenlik sağlamak için güvenli XChaCha20 şifresini ve Argon2id anahtar türetme işlevini kullanır. Şifreleme özellikleri için Go'nun standart x/crypto modüllerini kullanır. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Documentation" } -[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Kaynak Kod" } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
İndirmeler @@ -206,7 +206,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/tr/health-and-wellness.md b/i18n/tr/health-and-wellness.md index fb474298..3c30c0fc 100644 --- a/i18n/tr/health-and-wellness.md +++ b/i18n/tr/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/tr/index.md b/i18n/tr/index.md index e7eb5991..1bfa3a43 100644 --- a/i18n/tr/index.md +++ b/i18n/tr/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. Örneğin, insanların çeşitli ürünleri "gizli olmadığı" gerekçesi ile eleştirdiğini görürsünüz, oysaki demek istedikleri anonim sağlamadıklarıdır. Bu sitede üç konuyu da ele alıyoruz, ancak bunların arasındaki farkı ve her birinin ne zaman devreye girdiğini anlamanız önemlidir. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/tr/language-tools.md b/i18n/tr/language-tools.md index 7e5265a8..0ff19477 100644 --- a/i18n/tr/language-tools.md +++ b/i18n/tr/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/tr/maps.md b/i18n/tr/maps.md index c7249dba..250d52cf 100644 --- a/i18n/tr/maps.md +++ b/i18n/tr/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Kriter diff --git a/i18n/tr/meta/admonitions.md b/i18n/tr/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/tr/meta/admonitions.md +++ b/i18n/tr/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/tr/news-aggregators.md b/i18n/tr/news-aggregators.md index df81a5a2..075c9102 100644 --- a/i18n/tr/news-aggregators.md +++ b/i18n/tr/news-aggregators.md @@ -42,10 +42,10 @@ cover: news-aggregators.webp ![NewsFlash logosu](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** Linux için açık kaynaklı, modern ve kullanımı kolay bir haber akışı okuyucusudur. Çevrimdışı kullanılabilir veya [Nextcloud News](https://apps.nextcloud.com/apps/news) veya [Inoreader](https://inoreader.com) gibi hizmetlerle birlikte kullanılabilir. Bir arama özelliğine ve doğrudan ekleyebileceğiniz önceden tanımlanmış bir kaynak listesine sahiptir. +**NewsFlash** Linux için açık kaynaklı, modern ve kullanımı kolay bir haber akışı okuyucusudur. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). Bir arama özelliğine ve doğrudan ekleyebileceğiniz önceden tanımlanmış bir kaynak listesine sahiptir. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Kaynak Kod" } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
İndirmeler @@ -62,11 +62,13 @@ cover: news-aggregators.webp ![Feeder logosu](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder**, Android için birçok [özelliğe](https://github.com/spacecowboy/Feeder#features) sahip ve RSS beslemelerinin klasörleriyle iyi çalışan modern bir RSS istemcisidir. RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML) ve [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed) destekler. +**Feeder**, Android için birçok [özelliğe](https://github.com/spacecowboy/Feeder#features) sahip ve RSS beslemelerinin klasörleriyle iyi çalışan modern bir RSS istemcisidir. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Documentation" } -[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Kaynak Kod" } +RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML) ve [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed) destekler. + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } +[:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" }
İndirmeler @@ -85,10 +87,12 @@ cover: news-aggregators.webp ![Miniflux logosu](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logosu](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** kendi kendinize barındırabileceğiniz web tabanlı bir haber toplayıcısıdır. RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML) ve [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed) destekler. +**Miniflux** kendi kendinize barındırabileceğiniz web tabanlı bir haber toplayıcısıdır. + +RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML) ve [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed) destekler. [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ cover: news-aggregators.webp ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ cover: news-aggregators.webp **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ Giriş yapmadan ve kullanım bilgilerini Google hesabınızla ilişkilendirmeden

Örnek

-Bir RSS istemcisi ile bir YouTube kanalına abone olmak için, önce [kanal kodunu] arayın(https://support.google.com/youtube/answer/6180214). Kanal kodu, abone olmak istediğiniz YouTube kanalının hakkında sayfasında bulunabilir: **Hakkında** → **Paylaş** → **Kanal kimliğini kopyala**. Aşağıdaki `[CHANNEL ID]`yi değiştirin: +Bir RSS istemcisi ile bir YouTube kanalına abone olmak için, önce [kanal kodunu] arayın(https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Aşağıdaki `[CHANNEL ID]`yi değiştirin: ``metin https://youtube.com/feeds/videos.xml?channel_id=[KANAL KİMLİĞİ] diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index 88635ceb..c20e57c8 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Bulut tabanlı @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index ff3538dc..16828eb3 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Tarayıcılar ve işletim sistemleri gibi yazılımlardaki yerleşik parola yöneticileri bazen özel parola yöneticisi yazılımları kadar iyi olmayabilir. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -Örneğin Microsoft Edge'in parola yöneticisi uçtan uca şifrelemeyi desteklemez. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ Bu parola yöneticileri, tüm cihazlarınızdan kolay erişim ve cihaz kaybına - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password**, parolaları, geçiş anahtarlarını, kredi kartlarını, yazılım lisanslarını ve diğer hassas bilgileri güvenli bir dijital kasada saklamanıza olanak tanıyan, güvenlik ve kullanım kolaylığına odaklanan bir parola yöneticisidir. Kasanız bir [aylık ücret] karşılığında 1Password'ün sunucularında barındırılır (https://1password.com/sign-up). 1Password düzenli olarak [denetlenir](https://support.1password.com/security-assessments) ve olağanüstü müşteri desteği sağlar. 1Password kapalı kaynak kodludur; ancak ürünün güvenliği [security white paper] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) adresinde ayrıntılı olarak belgelenmiştir. +**1Password**, parolaları, geçiş anahtarlarını, kredi kartlarını, yazılım lisanslarını ve diğer hassas bilgileri güvenli bir dijital kasada saklamanıza olanak tanıyan, güvenlik ve kullanım kolaylığına odaklanan bir parola yöneticisidir. Kasanız bir [aylık ücret] karşılığında 1Password'ün sunucularında barındırılır (https://1password.com/sign-up). + +1Password düzenli olarak [denetlenir](https://support.1password.com/security-assessments) ve olağanüstü müşteri desteği sağlar. 1Password kapalı kaynak kodludur; ancak ürünün güvenliği [security white paper] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) adresinde ayrıntılı olarak belgelenmiştir. [:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -238,7 +240,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud " }
-İndirmeler +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) @@ -246,16 +248,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Geleneksel olarak 1Password, macOS ve iOS kullanan kişiler için en iyi parola yöneticisi kullanıcı deneyimini sunmuştur; ancak artık tüm platformlarda özellik eşitliğine ulaşmıştır. 1Password'ün müşterileri, kullanım ve gezinme kolaylığı için sezgisel bir kullanıcı arayüzünün yanı sıra gelişmiş işlevsellik gibi ailelere ve daha az teknik kişilere yönelik birçok özelliğe sahiptir. Özellikle, 1Password'ün neredeyse her özelliği yerel mobil veya masaüstü istemcilerinde mevcuttur. +Geleneksel olarak 1Password, macOS ve iOS kullanan kişiler için en iyi parola yöneticisi kullanıcı deneyimini sunmuştur; ancak artık tüm platformlarda özellik eşitliğine ulaşmıştır. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Özellikle, 1Password'ün neredeyse her özelliği yerel mobil veya masaüstü istemcilerinde mevcuttur. 1Password kasanız hem ana parolanızla hem de sunucularında verilerinizi şifrelemek için rastgele 34 karakterli bir güvenlik anahtarıyla korunur. Bu güvenlik anahtarı verilerinize bir koruma katmanı ekler çünkü verileriniz ana parolanızdan bağımsız olarak yüksek entropi ile güvence altına alınır. Diğer birçok parola yöneticisi çözümü, verilerinizin güvenliğini sağlamak için tamamen ana parolanızın gücüne dayanır. @@ -273,12 +275,12 @@ Geleneksel olarak 1Password, macOS ve iOS kullanan kişiler için en iyi parola [](){ .card-link title=Contribute" }
-İndirmeler +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -327,14 +329,14 @@ Bu seçenekler şifrelenmiş bir parola veritabanını yerel olarak yönetmenizi [:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }???
-İndirmeler +Downloads - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -348,12 +350,12 @@ KeePassXC dışa aktarma verilerini [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logosu](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** Android için hafif bir şifre yöneticisidir; şifrelenmiş verilerin KeePass formatında tek bir dosyada düzenlenmesine izin verir ve formları güvenli bir şekilde doldurabilir. Uygulamanın [pro sürümü](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) kozmetik içeriğin ve standart dışı protokol özelliklerinin kilidini açmanıza izin verir, ancak daha da önemlisi, gelişime yardımcı olur ve teşvik eder. +**KeePassDX** Android için hafif bir şifre yöneticisidir; şifrelenmiş verilerin KeePass formatında tek bir dosyada düzenlenmesine izin verir ve formları güvenli bir şekilde doldurabilir. -[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary }[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Public Instances"} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title=Documentation} -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Source Code" } -[](){ .card-link title=Contribute" } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
İndirmeler @@ -365,6 +367,8 @@ KeePassXC dışa aktarma verilerini [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/tr/pastebins.md b/i18n/tr/pastebins.md index 72c0b3c7..f1499b8b 100644 --- a/i18n/tr/pastebins.md +++ b/i18n/tr/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Gereksinimler - Must be open source. -- "Sıfır güven" uçtan uca şifreleme uygulamalıdır. +- Must implement "zero-trust" E2EE. - Parola korumalı dosyaları desteklemelidir. ### En İyi Durum En iyi durum kriterlerimiz, bu kategorideki mükemmel bir projede görmek istediklerimizi temsil etmektedir. Önerilerimiz bu işlevlerden herhangi birini veya tamamını içermeyebilir, ancak içerenler bu sayfada diğerlerinden daha üst sıralarda yer alabilir. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/tr/photo-management.md b/i18n/tr/photo-management.md index 3afc48bd..4fd8a8c5 100644 --- a/i18n/tr/photo-management.md +++ b/i18n/tr/photo-management.md @@ -1,7 +1,7 @@ --- title: Fotoğraf Yönetimi icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Gereksinimler -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/tr/privacy.md b/i18n/tr/privacy.md index 87ac8bd6..d2864136 100644 --- a/i18n/tr/privacy.md +++ b/i18n/tr/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index a9f4428c..0ad8d367 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Şifrelenmiş Mesajlaşma Uygulamaları diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index 436edc6a..e8b21d47 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -350,7 +350,7 @@ Diğerlerinin yanı sıra [Mullvad](https://mullvad.net/en/help/dns-over-https-a
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index ae5bfab3..4fbb5d2f 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,11 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logosu](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser**, iOS cihazlarda Tor ağı üzerinden anonim olarak web'de gezinmenizi sağlayan açık kaynaklı bir tarayıcıdır ve [Tor Projesi](https://support.torproject.org/glossary/onion-browser) tarafından desteklenmektedir. [:octicons-home-16: Ana Sayfa](https://cryptomator.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute } +**Onion Browser**, iOS cihazlarda Tor ağı üzerinden anonim olarak web'de gezinmenizi sağlayan açık kaynaklı bir tarayıcıdır ve [Tor Projesi](https://support.torproject.org/glossary/onion-browser) tarafından desteklenmektedir. + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) + +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
İndirmeler diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index 82141660..e1c835e8 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -144,8 +144,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/uk/about/donation-acceptance-policy.md b/i18n/uk/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/uk/about/donation-acceptance-policy.md +++ b/i18n/uk/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/uk/about/jobs.md b/i18n/uk/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/uk/about/jobs.md +++ b/i18n/uk/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/uk/advanced/communication-network-types.md b/i18n/uk/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/uk/advanced/communication-network-types.md +++ b/i18n/uk/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/uk/advanced/tor-overview.md b/i18n/uk/advanced/tor-overview.md index e3595e5b..7b362b33 100644 --- a/i18n/uk/advanced/tor-overview.md +++ b/i18n/uk/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/uk/ai-chat.md b/i18n/uk/ai-chat.md index 7f5a8c5c..2254bc8f 100644 --- a/i18n/uk/ai-chat.md +++ b/i18n/uk/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/uk/alternative-networks.md b/i18n/uk/alternative-networks.md index 7753da39..3ea39368 100644 --- a/i18n/uk/alternative-networks.md +++ b/i18n/uk/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/uk/android/general-apps.md b/i18n/uk/android/general-apps.md index b97efed5..92d3a9a7 100644 --- a/i18n/uk/android/general-apps.md +++ b/i18n/uk/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/uk/basics/vpn-overview.md b/i18n/uk/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/uk/basics/vpn-overview.md +++ b/i18n/uk/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md index 923aacf6..359c42e6 100644 --- a/i18n/uk/basics/why-privacy-matters.md +++ b/i18n/uk/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Джерела diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index 97c95733..fefc5860 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Пасивні атаки](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Постачальники послуг](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index 763db545..494db66d 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -34,7 +34,7 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ You should **never** use blur to redact [text in images](https://bishopfox.com/b **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md index 4684439a..e46cd44e 100644 --- a/i18n/uk/desktop-browsers.md +++ b/i18n/uk/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index 7d0e94df..986326b2 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/uk/dns.md b/i18n/uk/dns.md index 996d786d..e9363d67 100644 --- a/i18n/uk/dns.md +++ b/i18n/uk/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/uk/document-collaboration.md b/i18n/uk/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/uk/document-collaboration.md +++ b/i18n/uk/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index 74a7b278..e5efb915 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security. It uses Go's standard x/crypto modules for its encryption features. -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/uk/health-and-wellness.md b/i18n/uk/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/uk/health-and-wellness.md +++ b/i18n/uk/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/uk/index.md b/i18n/uk/index.md index c0a9a007..412b7cde 100644 --- a/i18n/uk/index.md +++ b/i18n/uk/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/uk/language-tools.md b/i18n/uk/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/uk/language-tools.md +++ b/i18n/uk/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/uk/maps.md b/i18n/uk/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/uk/maps.md +++ b/i18n/uk/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/uk/meta/admonitions.md b/i18n/uk/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/uk/meta/admonitions.md +++ b/i18n/uk/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/uk/news-aggregators.md b/i18n/uk/news-aggregators.md index ebd09d69..b2083170 100644 --- a/i18n/uk/news-aggregators.md +++ b/i18n/uk/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index fba5d270..1632b97e 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/uk/office-suites.md b/i18n/uk/office-suites.md index 43ba82c5..63e3e6c3 100644 --- a/i18n/uk/office-suites.md +++ b/i18n/uk/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/uk/os/windows/group-policies.md b/i18n/uk/os/windows/group-policies.md index faac8ed6..a25589b3 100644 --- a/i18n/uk/os/windows/group-policies.md +++ b/i18n/uk/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index 5e9a03f4..d60eb44c 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/uk/pastebins.md b/i18n/uk/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/uk/pastebins.md +++ b/i18n/uk/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/uk/photo-management.md b/i18n/uk/photo-management.md index d179ce29..e67b4fa6 100644 --- a/i18n/uk/photo-management.md +++ b/i18n/uk/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/uk/privacy.md b/i18n/uk/privacy.md index dce8c28f..3c428626 100644 --- a/i18n/uk/privacy.md +++ b/i18n/uk/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index 1d4719d0..b2f2fd72 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index 375fed2d..c4791078 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index 1cf45d9b..b8a6e456 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-![Логотип Tor Browser](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** — це вибір, якщо вам потрібна анонімність, оскільки він надає доступ до мережі Tor і мостів, а також включає в себе стандартні налаштування і розширення, які автоматично налаштовуються на рівні безпеки за замовчуванням: *Стандартний*, *Безпечніший* і *Найбезпечніший*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ If more complete anonymity is paramount to your situation, you should **only** b
-Браузер Tor розроблений таким чином, щоб запобігти зняттю відбитків або ідентифікації вас на основі конфігурації вашого браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Браузер Tor розроблений таким чином, щоб запобігти зняттю відбитків або ідентифікації вас на основі конфігурації вашого браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index 95b7cd72..6dcd925b 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/vi/about/donation-acceptance-policy.md b/i18n/vi/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/vi/about/donation-acceptance-policy.md +++ b/i18n/vi/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/vi/about/jobs.md b/i18n/vi/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/vi/about/jobs.md +++ b/i18n/vi/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/vi/advanced/communication-network-types.md b/i18n/vi/advanced/communication-network-types.md index a478b279..2f01e906 100644 --- a/i18n/vi/advanced/communication-network-types.md +++ b/i18n/vi/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use. -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Centralized Networks diff --git a/i18n/vi/advanced/tor-overview.md b/i18n/vi/advanced/tor-overview.md index 9bae6ff9..89298ab4 100644 --- a/i18n/vi/advanced/tor-overview.md +++ b/i18n/vi/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor is a free to use, decentralized network designed for using the [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## Path Building to Clearnet Services @@ -137,7 +137,7 @@ The exit node will be chosen at random from all available Tor nodes ran with an "Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`. -Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours. +Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor path showing your traffic being routed through your three Tor nodes plus three additional Tor nodes which hide the website's identity](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl ## Encryption -Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order. +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. Once Tor has built a circuit, data transmission is done as follows: -1. Firstly: when the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. In this encrypted packet, the entry node will find another encrypted packet with the middle node’s address. The entry node will then forward the packet to the middle node. -2. Secondly: when the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. The middle node will then forward the packet to the exit node. -3. Lastly: when the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. The exit node will see the destination address and forward the packet to that address. Below is an alternative diagram showing the process. Each node removes its own layer of encryption, and when the destination server returns data, the same process happens entirely in reverse. For example, the exit node does not know who you are, but it does know which node it came from, and so it adds its own layer of encryption and sends it back. @@ -185,7 +185,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official** Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/vi/ai-chat.md b/i18n/vi/ai-chat.md index e7d8c74d..62b666b6 100644 --- a/i18n/vi/ai-chat.md +++ b/i18n/vi/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/vi/alternative-networks.md b/i18n/vi/alternative-networks.md index 484e582e..894aa869 100644 --- a/i18n/vi/alternative-networks.md +++ b/i18n/vi/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/vi/android/general-apps.md b/i18n/vi/android/general-apps.md index d5a7605e..446d50be 100644 --- a/i18n/vi/android/general-apps.md +++ b/i18n/vi/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/vi/basics/vpn-overview.md b/i18n/vi/basics/vpn-overview.md index 9c8d00c6..4238758e 100644 --- a/i18n/vi/basics/vpn-overview.md +++ b/i18n/vi/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md index dd20233c..3c5292b5 100644 --- a/i18n/vi/basics/why-privacy-matters.md +++ b/i18n/vi/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ Privacy is ultimately about human information, and this is important because we Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **Privacy** @@ -58,7 +58,7 @@ Take cookie consent forms, for example. You may encounter these dozens of times Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## Sources diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index a6141209..c6959215 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- Must enforce end-to-end encryption. +- Must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- Clients should be audited in their entirety by an independent third-party. +- Clients should be audited in their entirety by an independent third party. - Should offer native clients for Linux, Android, Windows, macOS, and iOS. - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. -- Should support easy file-sharing with other users. +- Should support easy file sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index 72ee94e5..64e9c694 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -34,7 +34,7 @@ Siêu dữ liệu hiện không bị xóa khỏi tệp video nhưng đó là k
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ Siêu dữ liệu hiện không bị xóa khỏi tệp video nhưng đó là k **ExifEraser** is a modern, permissionless image metadata erasing application for Android. -It currently supports JPEG, PNG and WebP files. +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md index d9f6bfa6..92cb2480 100644 --- a/i18n/vi/desktop-browsers.md +++ b/i18n/vi/desktop-browsers.md @@ -91,7 +91,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index a0c0e2e8..64117db1 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -24,8 +24,8 @@ Linux distributions are commonly recommended for privacy protection and software **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. These new technologies often come with improvements in security, privacy, and usability in general. [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora has a semi-rolling release cycle. While some packages like the desktop en openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/vi/dns.md b/i18n/vi/dns.md index cb6b6731..1cefede6 100644 --- a/i18n/vi/dns.md +++ b/i18n/vi/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/vi/document-collaboration.md b/i18n/vi/document-collaboration.md index 8a8c3a8e..c13e5d96 100644 --- a/i18n/vi/document-collaboration.md +++ b/i18n/vi/document-collaboration.md @@ -54,7 +54,7 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index b12ad7b1..19a2c167 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -76,7 +76,7 @@ Cryptomator's documentation details its intended [security target](https://docs. - [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) - [:fontawesome-brands-github: Mã nguồn](https://github.com/cryptomator) -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -218,7 +218,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/vi/health-and-wellness.md b/i18n/vi/health-and-wellness.md index 9372fd1e..b98e8f79 100644 --- a/i18n/vi/health-and-wellness.md +++ b/i18n/vi/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/vi/index.md b/i18n/vi/index.md index b181fecd..f200d7ef 100644 --- a/i18n/vi/index.md +++ b/i18n/vi/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/vi/language-tools.md b/i18n/vi/language-tools.md index f13bbf83..3728b71f 100644 --- a/i18n/vi/language-tools.md +++ b/i18n/vi/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/vi/maps.md b/i18n/vi/maps.md index 7a6080f1..33a1bee0 100644 --- a/i18n/vi/maps.md +++ b/i18n/vi/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Framadate diff --git a/i18n/vi/meta/admonitions.md b/i18n/vi/meta/admonitions.md index 84067e71..80b860cc 100644 --- a/i18n/vi/meta/admonitions.md +++ b/i18n/vi/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/vi/news-aggregators.md b/i18n/vi/news-aggregators.md index ca49e832..07c2de9f 100644 --- a/i18n/vi/news-aggregators.md +++ b/i18n/vi/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index 6aebc358..97d139a5 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -1,7 +1,7 @@ --- title: "Sổ Ghi Chép" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -Nếu bạn hiện đang sử dụng một ứng dụng như Evernote, Google Keep hoặc Microsoft OneNote, chúng tôi khuyên bạn nên chọn một ứng dụng thay thế hỗ trợ E2EE tại đây. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Dựa trên đám mây @@ -21,13 +21,15 @@ Nếu bạn hiện đang sử dụng một ứng dụng như Evernote, Google Ke ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -Standard Notes là một ứng dụng ghi chú đơn giản và riêng tư giúp bạn ghi chú dễ dàng và có sẵn ở mọi nơi. Nó có tính năng E2EE trên mọi nền tảng và trải nghiệm máy tính để bàn mạnh mẽ với các chủ đề và trình chỉnh sửa tùy chỉnh. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. Nó có tính năng E2EE trên mọi nền tảng và trải nghiệm máy tính để bàn mạnh mẽ với các chủ đề và trình chỉnh sửa tùy chỉnh. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ Standard Notes là một ứng dụng ghi chú đơn giản và riêng tư giúp - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. Nó cung cấp E2EE và có thể đồng bộ hóa thông qua Nextcloud, Dropbox, v.v. Nó cũng cung cấp khả năng nhập dễ dàng từ Evernote và ghi chú văn bản thuần túy. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. Nó cũng cung cấp khả năng nhập dễ dàng từ Evernote và ghi chú văn bản thuần túy. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dữ liệu vẫn được mã hóa khi chuyển tiếp và tại vị trí đồng bộ hóa bằng khóa chính của bạn. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dữ liệu vẫn được mã hóa khi chuyển tiếp và tại vị trí đồng bộ hóa bằng khóa chính của bạn. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### EteSync Notes @@ -116,23 +122,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![EteSync Notes logo](assets/img/notebooks/etesync-notes.png){ align=right } -**EteSync Notes** là một ứng dụng ghi chú an toàn, được mã hóa qui trình đầu cuối và tôn trọng quyền riêng tư. EteSync cũng cung cấp phần mềm tùy chọn dưới dạng dịch vụ với giá [$24 mỗi năm](https://dashboard.etebase.com/user/partner/pricing/), hoặc bạn có thể tự lưu trữ máy chủ miễn phí. +**EteSync Notes** là một ứng dụng ghi chú an toàn, được mã hóa qui trình đầu cuối và tôn trọng quyền riêng tư. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -142,12 +150,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/vi/office-suites.md b/i18n/vi/office-suites.md index 05ba3191..c1b93b84 100644 --- a/i18n/vi/office-suites.md +++ b/i18n/vi/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/vi/os/windows/group-policies.md b/i18n/vi/os/windows/group-policies.md index d1a033cb..b0987d0b 100644 --- a/i18n/vi/os/windows/group-policies.md +++ b/i18n/vi/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index 977b812c..8a93d980 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -128,22 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

Info

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -tải xuống - - - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - - [:fontawesome-brands-apple: macOS](https://keepassxc.org/download/#mac) - - [:fontawesome-brands-linux: Linux](https://keepassxc.org/download/#linux) - - [:pg-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - - [:fontawesome-brands-firefox: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) - - [:fontawesome-brands-chrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) - - [:fontawesome-brands-github: Mã nguồn](https://github.com/keepassxreboot/keepassxc) Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -175,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -212,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -237,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -252,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -284,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -338,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -354,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -371,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/vi/pastebins.md b/i18n/vi/pastebins.md index 07132d00..30822fac 100644 --- a/i18n/vi/pastebins.md +++ b/i18n/vi/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/vi/photo-management.md b/i18n/vi/photo-management.md index 4bcb151c..acf2d957 100644 --- a/i18n/vi/photo-management.md +++ b/i18n/vi/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - Must offer a web interface which supports basic file management functionality. @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/vi/privacy.md b/i18n/vi/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/vi/privacy.md +++ b/i18n/vi/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index 322416f7..c93dec5b 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## Encrypted Messengers diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 31db27a3..64256e92 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index d8552b3e..0c45b206 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -52,13 +52,13 @@ If more complete anonymity is paramount to your situation, you should **only** b ![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -96,13 +96,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index 93e46825..38ce2939 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/zh-Hant/about/donation-acceptance-policy.md b/i18n/zh-Hant/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/zh-Hant/about/donation-acceptance-policy.md +++ b/i18n/zh-Hant/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/zh-Hant/advanced/communication-network-types.md b/i18n/zh-Hant/advanced/communication-network-types.md index 41122276..e34eb59a 100644 --- a/i18n/zh-Hant/advanced/communication-network-types.md +++ b/i18n/zh-Hant/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 簡介常見的即時通訊應用程式網路架構。 有幾種網路架構常運用於在人與人之間傳遞消息。 這些網路提供不同的隱私保證,這就是為什麼在決定使用哪個應用程式時,最好能考慮您的[威脅模型](../basics/threat-modeling.md) 。 -[推薦的即時通訊軟體](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 集中式網路 diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index 2ac633c0..9fba6e33 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor 是一個免費使用的去中心化網路,其讓用戶在使 [Tor ](../alternative-networks.md#tor)是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor 的工作原理是通過志願者運營的伺服器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=首頁 } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="洋蔥服務" } @@ -35,13 +35,13 @@ If you live in a free country, are accessing mundane content via Tor, aren't wor 直接連接到 Tor 將使您的連接在任何區域網路管理員或 ISP 面前暴露。 網路管理員過去已[偵測並將此類流量作關聯性](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax),以識別網路上的特定 Tor 使用者並對其進行去匿名化。 另一方面,連接 VPN 並不會太可疑,因為日常消費者使用商業 VPN 服務來執行各種日常任務例如繞過地理限制,即使在網路限制嚴格的國家也是如此。 -所以應在**在**連接到 Tor 網路之前盡力隱藏自己的 IP 位址。 只需連接到VPN(透過電腦上安裝的客戶端),然後正常存取[Tor](../tor.md)(例如透過Tor 瀏覽器)即可做到這一點。 這將建立一個連接鏈,例如: +所以應在**在**連接到 Tor 網路之前盡力隱藏自己的 IP 位址。 You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] 你 → VPN → Tor → 網際網路 從 ISP 的角度來看,用戶似乎正在存取 VPN(提供的相關保護)。 從 VPN 角度,他們可以看到您正在連接到 Tor 網路,但看不到您訪問哪些網站。 從Tor 角度,可以正常連接,但萬一發生某種 Tor 網路洩露的情況(不太可能發生),只有 VPN 的IP 會被暴露,且所用的VPN 也會*額外*妥協才能使您去匿名化。 -這**不是**規避審查的建議,如 Tor 被 ISP 完全封鎖, VPN 也可能遭封鎖。 相反,此建議旨在使流量與常見 VPN 用戶流量更好地融合,透過掩蓋從 ISP 連接到 Tor 的事實來提供某種程度的合理推諉。 +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. 相反,此建議旨在使流量與常見 VPN 用戶流量更好地融合,透過掩蓋從 ISP 連接到 Tor 的事實來提供某種程度的合理推諉。 --- @@ -51,7 +51,7 @@ If you live in a free country, are accessing mundane content via Tor, aren't wor - 你 → VPN → Tor → VPN → 網際網路 - 任何其它設定 -有些 VPN 提供者和其他出版物會推薦這些**不良**配置,以逃避某些地區的 Tor 禁令(出口節點被網站阻止)。 [通常](https://support.torproject.org/#about_change-paths),Tor 會經常更改通過網路的迴路路徑。 當選擇永久*目的地* VPN(在*Tor 之後*連接到VPN 伺服器)時,就消除了此番優勢且嚴重損害匿名性。 +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [通常](https://support.torproject.org/#about_change-paths),Tor 會經常更改通過網路的迴路路徑。 當選擇永久*目的地* VPN(在*Tor 之後*連接到VPN 伺服器)時,就消除了此番優勢且嚴重損害匿名性。 此類不良配置很難無意中完成,因為它通常涉及在 Tor 瀏覽器內設定自訂代理設置,或在 VPN 用戶端內設定自訂代理設定(透過 Tor 瀏覽器路由 VPN 流量)。 只要避免這些非預設配置,可能就沒問題。 @@ -60,7 +60,7 @@ If you live in a free country, are accessing mundane content via Tor, aren't wor

VPN/SSH 指紋

-Tor Project [指出](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) *理論上*使用 VPN 對 ISP 隱藏 Tor 活動可能並非萬無一失。 人們發現 VPN 很容易受到網站流量指紋辨識的影響,攻擊者仍然可猜測正在造訪哪個網站,因為所有網站都有特定的流量模式。 +Tor Project [指出](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) *理論上*使用 VPN 對 ISP 隱藏 Tor 活動可能並非萬無一失。 VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. 因此,相信 VPN 隱藏的加密 Tor 流量也可以透過類似的方法被偵測,這並非沒道理。 沒有這個主題的研究論文,我們仍然認為使用 VPN 的好處遠遠超過這些風險,但需要記住這點。 @@ -68,11 +68,11 @@ Tor Project [指出](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPl
-確定是否應該先使用 VPN 連接到 Tor 網路需要一些常識和了解當地政府和 ISP 與所連接內容的政策。 然而在多數情況下,最好被視為連接到商業 VPN 網路,而不是直接連到 Tor 網路。 如果VPN 服務商在您的地區受到審查,那麼也可以考慮使用Tor 可插拔傳輸(例如 Snowflake 或 meek )作為替代方案,但使用這些橋接器可能比標準WireGuard/OpenVPN 隧道引起更多懷疑。 +確定是否應該先使用 VPN 連接到 Tor 網路需要一些常識和了解當地政府和 ISP 與所連接內容的政策。 To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## Tor 並非是 -Tor 網路並非在任何情況下都是完美的隱私保護工具,其存在一些應仔細考慮的缺點。 如果 Tor 適合您的需求,則這些缺點不應阻止 Tor 使用,但在決定哪種解決方案最適合時仍然需要考慮這些問題。 +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. 如果 Tor 適合您的需求,則這些缺點不應阻止 Tor 使用,但在決定哪種解決方案最適合時仍然需要考慮這些問題。 ### Tor 不是免費的 VPN @@ -80,26 +80,26 @@ Tor 網路並非在任何情況下都是完美的隱私保護工具,其存在 不同於 Tor 出口節點,VPN 服務商通常不會*主動*[惡意](#caveats)。 Tor 出口節點可由任何人創建,它們是網路日誌記錄和修改的熱點。 2020 年許多 Tor 出口節點被記錄將 HTTPS 流量降級為 HTTP,以便[「劫持」加密貨幣交易](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year)。 其他出口節點攻擊,例如用惡意軟體替換通過未加密通道的下載。 HTTPS 確實某程度緩解了這些威脅。 -正如我們已提過的,Tor 在網路上很容易識別。 與實際的 VPN 服務不同,使用 Tor 會讓您成為可能試圖逃避當局的人。 在理想的世界中,Tor 會被網路管理員和當局視為一種多種用途的工具(就像如何看待VPN)。但現實中,Tor 的認知仍然遠不如承認商業 VPN 的正當性,因此使用真正的 VPN 提供看似合理的推諉,例如 「我只是用它來觀看 Netflix,」等等。 +正如我們已提過的,Tor 在網路上很容易識別。 與實際的 VPN 服務不同,使用 Tor 會讓您成為可能試圖逃避當局的人。 In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor 的使用並非無法偵測 -**即便使用橋接器和可插拔傳輸,**Tor 專案並未提供任何工具來對ISP 隱藏正在使用 Tor 的事實。 即使使用模糊的「可插拔傳輸」或非公共橋接器也不能隱藏正在使用私人通訊通道的事實。 最受歡迎的可插拔傳輸,例如obfs4(將流量混淆為「看起來沒什麼」)和meek(使用網域前置來偽裝流量)可以是[使用相當標準的流量分析技術檢測](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html)。 Snowflake 也有類似的問題, *在 Tor 連線建立之前*[很容易被偵測到](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html)。 +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. 即使使用模糊的「可插拔傳輸」或非公共橋接器也不能隱藏正在使用私人通訊通道的事實。 最受歡迎的可插拔傳輸,例如obfs4(將流量混淆為「看起來沒什麼」)和meek(使用網域前置來偽裝流量)可以是[使用相當標準的流量分析技術檢測](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html)。 Snowflake 也有類似的問題, *在 Tor 連線建立之前*[很容易被偵測到](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html)。 -還有這三種以外的可插拔傳輸,但通常依賴透過隱蔽性來逃避偵測的安全性。 它們不是不可能被檢測,只是使用者太少,以至於不值得為它們建立檢測器。 如果特別遭受監控,則不應依賴它們。 +還有這三種以外的可插拔傳輸,但通常依賴透過隱蔽性來逃避偵測的安全性。 They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. 如果特別遭受監控,則不應依賴它們。 了解繞過審查和逃避檢測兩者的差異很重要。 要實現前者更容易,因為網路審查員實際上存在許多現實限制,但這些技術並沒有掩蓋這個事實:監視網路使用的相關單位知道您——*的確在* — —使用Tor 。 ### Tor 瀏覽器不是最*安全*的瀏覽器 -匿名性常常與安全性相矛盾:Tor 的匿名性要求每個使用者都是相同的,這會造成單一文化(所有 Tor 瀏覽器使用者都存在相同的錯誤)。 依網路安全的經驗法則,單一文化通常認為不好:透過多樣性(Tor 所缺乏的)實現安全性,透過將漏洞限制在較小的群體中,提供了自然隔離通常是可取的,但這種多樣性對於匿名性來說也不太有利。 +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). 依網路安全的經驗法則,單一文化通常認為不好:透過多樣性(Tor 所缺乏的)實現安全性,透過將漏洞限制在較小的群體中,提供了自然隔離通常是可取的,但這種多樣性對於匿名性來說也不太有利。 此外,Tor 瀏覽器是 Firefox 的擴展支援版本,僅接收被視為*嚴重*和*高*漏洞的補丁>(不是*中*和*低*)。 這意味著攻擊者可以(例如): 1. 在 Firefox nightly 或 beta 版本中尋找新的嚴重/高危險漏洞,然後檢查它們可否利用在 Tor 瀏覽器(此漏洞週期可能會持續數週)。 2. 將*多個*中/低漏洞連結在一起,直到它們獲得所需的存取等級(此漏洞週期可能會持續數月或更長時間)。 -面臨瀏覽器漏洞風險者應考慮採取額外的保護措施來防禦Tor 瀏覽器漏洞,例如在[Qubes](../os/qubes-overview.md) 使用Whonix 來限制 Tor 瀏覽安全的虛擬器並防止洩漏。 +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## 連接明網服務的路徑建立 @@ -137,7 +137,7 @@ Tor 網路並非在任何情況下都是完美的隱私保護工具,其存在 “Onion 服務” (通常也被稱為“洋蔥服務” )是只能由 Tor 瀏覽器訪問的網站。 這些網站有一個長串隨機生成的域名,結尾為 `.onion`。 -在Tor中連接到 Onion服務的工作原理與連接到明網服務非常相似,但您的流量在到達目的地伺服器之前會通過 **6 個** 節點。 不過就如之前所言,其中只有三個節點會有助 *您的*匿名性,而另外三個節點則是為了保護 * Onion 服務* 匿名性,隱藏該網站的真正 IP 和位置,就如同 Tor 瀏覽器如何隱蔽您的 IP 一樣。 +在Tor中連接到 Onion服務的工作原理與連接到明網服務非常相似,但您的流量在到達目的地伺服器之前會通過 **6 個** 節點。 Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![Tor路徑顯示您的流量通過您的三個Tor節點加上三個額外的Tor節點隱藏網站的身份](../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Tor 網路並非在任何情況下都是完美的隱私保護工具,其存在 ## 加密 -Tor 使用來自出口,中間和入口節點的金鑰對每個封包(傳輸數據區塊)依序進行三次加密。 +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. 一旦 Tor 構建了電路,數據傳輸將按照以下方式進行: -1. 首先:當數據包到達入口節點時,第一層加密被移除。 在這個加密封包中,入口節點將找到另一個具有中間節點位址的加密封包。 然後,入口節點將將封包轉發到中間節點。 +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. 在這個加密封包中,入口節點將找到另一個具有中間節點位址的加密封包。 然後,入口節點將將封包轉發到中間節點。 -2. 其次:當中間節點從入口節點接收到封包時,它也會利用其金鑰刪除一層加密,找到具有出口節點位址的加密資料包。 然後中間節點將數據包轉發到出口節點。 +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. 然後中間節點將數據包轉發到出口節點。 -3. 最後:當退出節點收到其資料包時,它將使用其金鑰移除最後一層加密。 出口節點將看到目的地位址,並將封包轉發到該位址。 +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. 出口節點將看到目的地位址,並將封包轉發到該位址。 下面是顯示此過程的圖表。 每個節點都會移除自己的加密層,當目的地伺服器傳回數據時,同樣過程會再反向發生。 例如,出口節點不知道你是誰,但它確實知道封包來自哪個節點,因此添加了自己的加密層並將其發送回來。 @@ -185,7 +185,7 @@ Tor 允許我們連接到伺服器,而不讓任何一方知道完整路徑。 Tor 橋接器通常被認為是向 ISP 隱藏 Tor 使用情況的替代方法,而不是 VPN(我們建議盡可能使用後者 )。 需要考慮的是,雖然橋接器可以提供足夠的審查規避,但這只是*暫時*的好處。 它們無法充分保護您,防止 ISP 透過歷史流量日誌分析發現您*過去*連接 Tor。 -請考慮以下場景來理解:透過橋接器連接到 Tor,而 ISP 沒有偵測到它,因為他們沒有對流量進行複雜分析,因此一切都按預期進行。 現在,4個月過去,橋接器 IP 已經公開了。 這種情況在橋接器中很常見,它們被發現並被封鎖的頻率相對較高,但不是立即發生。 +請考慮以下場景來理解:透過橋接器連接到 Tor,而 ISP 沒有偵測到它,因為他們沒有對流量進行複雜分析,因此一切都按預期進行。 現在,4個月過去,橋接器 IP 已經公開了。 This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. 您的 ISP 想要辨識出 4 個月前 Tor 用戶,透過其有限的元資料記錄,他們可以看到您連接到的 IP 位址其實是 Tor 橋接器。 您幾乎沒有其他藉口進行此類連接,因此 ISP 可以非常有信心地說您當時是 Tor 用戶。 @@ -193,7 +193,7 @@ Tor 橋接器通常被認為是向 ISP 隱藏 Tor 使用情況的替代方法, ISP 肯定不會截取所有資料包級資料與將其永久儲存,他們*無法利用深度資料包檢查等先進技術* 來確認通過VPN 連接的內容,因此你有合理的推諉能力。 -因此,橋接器在規避網路審查時提供了最大的好處,但*目前*它們還未能充分取代**所有結合使用 VPN 和 Tor 的好處。 再次強調,這並不是*反對*使用 Tor 橋接器,但在做出決定時應該了解其限制。 在某些情況下,橋接器可能是*唯一*選項(例如,如果所有VPN 提供者都被封鎖),因此您仍然可以在這些情況下使用它們,但請記住此限制。

+因此,橋接器在規避網路審查時提供了最大的好處,但*目前*它們還未能充分取代**所有結合使用 VPN 和 Tor 的好處。 Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. 在某些情況下,橋接器可能是*唯一*選項(例如,如果所有VPN 提供者都被封鎖),因此您仍然可以在這些情況下使用它們,但請記住此限制。

如果認為橋接器比 VPN 的加密隧道更能幫助防禦指紋識別或其他進階網路分析,那麼可以一直選擇將橋接器與 VPN 結合使用。 這樣,即使對手取得對 VPN 隧道某程度的可見性,您仍然受到可插拔傳輸混淆技術的保護。 如果決定走這條路,建議您連接到 VPN 後面的 obfs4 橋,以獲得最佳的指紋識別保護,而不是 meek 或 Snowflake。 @@ -205,6 +205,6 @@ ISP 肯定不會截取所有資料包級資料與將其永久儲存,他們*無 - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: 迴路中的第一個節點被稱為“入口守衛”或“守衛”。 它是一個快速和穩定的中繼站,作迴路中的第一個入口通常會維持 2~3個月,以防止已知的匿名破壞攻擊。 其餘的迴路則會依每次訪問網站而變化,這些中繼節點共同提供Tor 完整隱私保護。 了解更多關於守衛中繼的運作,請參考 [部落格文章](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [入口守衛論文paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: 迴路中的第一個節點被稱為“入口守衛”或“守衛”。 它是一個快速和穩定的中繼站,作迴路中的第一個入口通常會維持 2~3個月,以防止已知的匿名破壞攻擊。 其餘的迴路則會依每次訪問網站而變化,這些中繼節點共同提供Tor 完整隱私保護。 了解更多關於守衛中繼的運作,請參考 [部落格文章](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [入口守衛論文paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: 中繼標記:迴路位置(例如, “Guard” , “Exit” , “BadExit” ) ,迴路屬性(例如, “Fast” , “Stable” )或角色(例如, “Authority” , “HSDir” )這些中繼節點的特殊( dis- )資格,是由目錄機構分配並在目錄協議規範中進一步定義。 ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: 中繼標記:迴路位置(例如, “Guard” , “Exit” , “BadExit” ) ,迴路屬性(例如, “Fast” , “Stable” )或角色(例如, “Authority” , “HSDir” )這些中繼節點的特殊( dis- )資格,是由目錄機構分配並在目錄協議規範中進一步定義。 ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/zh-Hant/ai-chat.md b/i18n/zh-Hant/ai-chat.md index ac0d33b6..5523dcd7 100644 --- a/i18n/zh-Hant/ai-chat.md +++ b/i18n/zh-Hant/ai-chat.md @@ -44,7 +44,7 @@ LLM 通常可以透過參數的數量來區分用途,對於提供給終端使 有許多採用寬鬆式自由軟體授權條款的模型可供下載。 [Hugging Face](https://huggingface.co/models) 是一個讓您瀏覽、研究和下載常用格式模型的平台,如 [GGUF](https://huggingface.co/docs/hub/en/gguf)。 提供優質 'open-weights'模型 的公司包括 Mistral、Meta、Microsoft 和 Google 等大公司。 However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. 如上所述,量化模型為使用消費級硬體的使用者提供了模型品質與效能之間的最佳平衡。 -為了幫助您選擇適合您的模型,您可以參考排行榜和基準。 使用最廣泛的排行榜是由社群驅動的 [LM Arena](https://lmarena.ai)。 此外,[OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) 著重於 'open-weights'模型 在一般基準上的表現,例如: [MMLU-Pro](https://arxiv.org/abs/2406.01574)。 也有一些專門的基準測量因素,例如: [情緒智力](https://eqbench.com)、[「不受限制的」一般智力](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard),以及 [其他許多因素](https://www.nebuly.com/blog/llm-leaderboards)。 +為了幫助您選擇適合您的模型,您可以參考排行榜和基準。 使用最廣泛的排行榜是由社群驅動的 [LM Arena](https://lmarena.ai)。 此外,[OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) 著重於 'open-weights'模型 在一般基準上的表現,例如: [MMLU-Pro](https://arxiv.org/abs/2406.01574)。 There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI 聊天客戶端 @@ -67,13 +67,13 @@ LLM 通常可以透過參數的數量來區分用途,對於提供給終端使 除了支援大量的文字模型之外,Kobold.cpp 也支援圖片產生器,如: [Stable Diffusion](https://stability.ai/stable-image) ;以及自動語音辨識工具,如: [Whisper](https://github.com/ggerganov/whisper.cpp)。 -[:octicons-home-16: 首頁](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="說明文件" } -[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="原始碼" } -[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="安全策略" } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } +[:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" }
-下載 +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/LostRuins/koboldcpp/releases) - [:simple-apple: macOS](https://github.com/LostRuins/koboldcpp/releases) @@ -108,7 +108,7 @@ Kobold.cpp 可讓您修改 AI 模型溫度和 AI 聊天的 system prompt 等參 [:octicons-lock-16:](https://github.com/ollama/ollama/blob/a14f76491d694b2f5a0dec6473514b7f93beeea0/SECURITY.md){ .card-link title="安全策略" }
-下載 +Downloads - [:fontawesome-brands-windows: Windows](https://ollama.com/download/windows) - [:simple-apple: macOS](https://ollama.com/download/mac) @@ -124,19 +124,19 @@ Ollama 可自動下載您要使用的 AI 模型,簡化設定本地 AI 聊天
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. 它 [由 Mozilla 資助](https://hacks.mozilla.org/2023/11/introducing-llamafile),可在 Linux、macOS 和 Windows 上使用。 Llamafile 也支援 LLaVA。 但是,它不支援語音辨識及圖片生成。 -[:octicons-home-16: 首頁](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="說明文件" } -[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="原始碼" } -[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="安全策略" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } +[:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" }
-下載 +Downloads - [:fontawesome-brands-windows: Windows](https://github.com/Mozilla-Ocho/llamafile#quickstart) - [:simple-apple: macOS](https://github.com/Mozilla-Ocho/llamafile#quickstart) diff --git a/i18n/zh-Hant/alternative-networks.md b/i18n/zh-Hant/alternative-networks.md index 79fd652b..d5623878 100644 --- a/i18n/zh-Hant/alternative-networks.md +++ b/i18n/zh-Hant/alternative-networks.md @@ -59,7 +59,7 @@ You can access the Tor network using other tools; making this determination come [:octicons-heart-16:](https://orbot.app/donate){ .card-link title="Contribute" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) @@ -129,7 +129,7 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or [:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=捐款 }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) - [:simple-android: Android](https://geti2p.net/en/download#android) @@ -154,5 +154,6 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or 然而,I2P 的方法也有缺點。 Tor 依賴專用的出口節點,這意味著更多的人可以在不太安全的環境中使用它,而且Tor 上確實存在的中繼可能性能更高、更穩定,因為它們通常不在長駐連接上運行。 Tor 也更關注**瀏覽器隱私**(即防指紋),並配有專用的 [Tor 瀏覽器](tor.md) 來盡可能使瀏覽活動匿名。 I2P 透過[常用網頁瀏覽器](desktop-browsers.md) 使用,雖然可以將瀏覽器設定為更保護隱私,但可能不會與其他 I2P 使用者有相同的瀏覽器指紋(沒有在這方面混在「人群」)。 +由於其強大的橋接網路和不同的[可插拔傳輸](https://tb-manual.torproject.org/circumvention),Tor 更能抵抗審查。 另一方面,I2P 使用目錄伺服器進行初始連接,這些目錄伺服器是變化的/不受信任的,由志願者運行,而 Tor 使用的硬編碼/受信任的伺服器可能更容易被阻止。 + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - 由於其強大的橋接網路和不同的[可插拔傳輸](https://tb-manual.torproject.org/circumvention),Tor 更能抵抗審查。 另一方面,I2P 使用目錄伺服器進行初始連接,這些目錄伺服器是變化的/不受信任的,由志願者運行,而 Tor 使用的硬編碼/受信任的伺服器可能更容易被阻止。 diff --git a/i18n/zh-Hant/android/general-apps.md b/i18n/zh-Hant/android/general-apps.md index e0b7801b..52469d57 100644 --- a/i18n/zh-Hant/android/general-apps.md +++ b/i18n/zh-Hant/android/general-apps.md @@ -70,13 +70,13 @@ Shelter 支援阻止跨配置檔案的聯絡人搜尋以及透過預設檔案管 **Secure Camera** 是一款專注於隱私和安全的相機應用程式,可以拍攝影像、影片及掃描QR碼。 可用設備還支援 CameraX 供應商擴充(肖像、HDR、夜視、臉部修飾和自動)。 -[:octicons-repo-16: 儲存庫](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } -[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=文檔} -[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="原始碼" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=捐款 } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases) @@ -116,12 +116,12 @@ Shelter 支援阻止跨配置檔案的聯絡人搜尋以及透過預設檔案管 [內容安全策略](https://zh.wikipedia.org/wiki/%E5%86%85%E5%AE%B9%E5%AE%89%E5%85%A8%E7%AD%96%E7%95%A5) 用於強制 WebView 中的 JavaScript 和樣式屬性完全是靜態內容。 -[:octicons-repo-16: 儲存庫](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="原始碼" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=捐款 } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases) diff --git a/i18n/zh-Hant/android/obtaining-apps.md b/i18n/zh-Hant/android/obtaining-apps.md index 31722ea7..db21ed8b 100644 --- a/i18n/zh-Hant/android/obtaining-apps.md +++ b/i18n/zh-Hant/android/obtaining-apps.md @@ -19,7 +19,7 @@ description: 我們建議您使用這些方法取得 Android 上的應用程式 [:octicons-heart-16:](https://github.com/sponsors/ImranR98){ .card-link title=捐款 }
-下載 +Downloads - [:simple-github: GitHub](https://github.com/ImranR98/Obtainium/releases) @@ -48,7 +48,7 @@ Google Play商店 需要登錄 Google帳戶 才能使用,這不利於隱私。 [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases) diff --git a/i18n/zh-Hant/basics/vpn-overview.md b/i18n/zh-Hant/basics/vpn-overview.md index 5bc74ff8..98598d75 100644 --- a/i18n/zh-Hant/basics/vpn-overview.md +++ b/i18n/zh-Hant/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: 虛擬私用網路將風險從您的ISP 轉移到您信任的第三 虛擬專用網路是將您的網路末端延伸到世界其它地方的一種方式。 -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} ISP 可以看到網路終端設備(例如數據機)的網際網路進出流量。 HTTPS 等加密協議通常應用在網際網路,因此雖無法確切地知道您發布或閱讀的內容,但還是可以了解您所請求訪問的 [網域名](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns)。 diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md index e83443ff..29f0b658 100644 --- a/i18n/zh-Hant/basics/why-privacy-matters.md +++ b/i18n/zh-Hant/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 許多人常把 **隱私**、 **安全**和 **匿名** 這幾個概念搞混。 例如,人們批評各種產品“不私密”,而實際上他們是指這些產品不提供匿名功能。 本網站涵蓋了這三個主題,但重要的是須了解它們之間的區別,以及每個主題何時發揮作用。 -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **隱私** @@ -58,7 +58,7 @@ description: 在此數位資料被狠狠利用的時代,隱私從未如此重 隱私需要融入到預設使用的[軟體和服務](../tools.md),您不能將大多數應用程式變成自己的隱私。 -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## 來源 diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index 659dba5c..7b5ddf9e 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: 被動攻擊](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: 服務提供商](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -**許多雲端儲存提供商** 要求您完全信任他們不會查看您的檔案。 下面列出的替代方案通過實施安全的 E2EE,消除了對信任的需要。 +**許多雲端儲存提供商** 要求您完全信任他們不會查看您的檔案。 The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. 如果這些替代方案不符合您的需求,建議您考慮使用其他雲端提供商的加密軟體,例如 [Cryptomator](encryption.md#cryptomator-cloud) 。 把 Cryptomator 結合在 **任一種** 雲服務商(包含這裡推薦的) 也是好方法,可減低某服務商原生客戶端加密漏洞之風險。 @@ -28,7 +28,9 @@ Nextcloud [仍是](document-collaboration.md#nextcloud) 自我託管檔案管理 ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** 是一個加密雲端儲存提供商,由經營廣受歡迎的加密電子郵件 [Proton Mail](email.md#proton-mail) 的提供商推出。 The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** 是一個加密雲端儲存提供商,由經營廣受歡迎的加密電子郵件 [Proton Mail](email.md#proton-mail) 的提供商推出。 + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: 首頁](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="隱私權政策" } @@ -47,9 +49,7 @@ Nextcloud [仍是](document-collaboration.md#nextcloud) 自我託管檔案管理
-Proton Drive 網路應用程式已於 [2021](https://proton.me/community/open-source) 接受了 Securitum 獨立審核。 - -Proton Drive 全新移動客戶端軟體尚未經過第三方公開審核。 +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -76,7 +76,7 @@ Proton Drive 全新移動客戶端軟體尚未經過第三方公開審核。 -Tresorit 已獲得多項獨立安全稽核: +Tresorit has received a number of independent security audits: - [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft - [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest @@ -84,9 +84,11 @@ Tresorit 已獲得多項獨立安全稽核: - Computest 發現了兩個已解決的漏洞。 - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - 該檢測分析了 Tresorit 完整源代碼,並驗證了落實 Tresorit [白皮書](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf)中描述的概念。 - - Ernst & Young 還測試了網路、行動和桌面客戶端: “測試結果發現沒有偏離 Tresorit 的資料機密性聲明。 + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: -他們還獲得了數位信任標籤(Digital Trust Label),這是 [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) 發出的認證,要求通過[35 項](https://swiss-digital-initiative.org/criteria)與安全性、隱私性和可靠性相關的標準。 + > Test results found no deviation from Tresorit’s data confidentiality claims. + +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. ## Peergos @@ -126,11 +128,11 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ## 標準 -**請注意,我們與推薦的任何項目均無關。**除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**請注意,我們與推薦的任何項目均無關。**除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 ### 最低合格要求 -- 必須執行端對端加密。 +- Must enforce E2EE. - 必須提供免費計劃或試用期以進行測試。 - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 必須提供支援基本檔案管理功能的網頁介面。 @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November 最佳情況標準代表我們希望在這個類別的完美項目的應具備的特性。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 - 客戶端應是開源的。 -- 客戶端軟體應由獨立的第三方進行全面審計。 +- Clients should be audited in their entirety by an independent third party. - 應提供 Linux、Android、Windows、macOS 和 iOS 的原生客戶端。 - 這些用戶端應與雲端儲存供應商的原生作業系統工具整合,例如整合 iOS 的 Files app,或 Android 的 DocumentsProvider 功能。 -- 容易與其他用戶輕鬆共享文件。 +- Should support easy file sharing with other users. - 至少在網頁界面應提供基本的文件預覽和編輯功能。 [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001): 2013合規性涉及公司的 [資訊安全管理系統](https://en.wikipedia.org/wiki/Information_security_management) ,涵蓋其雲端服務的銷售、開發、維護和支援。 diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index 325abdcb..6d35725e 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -32,12 +32,12 @@ cover: data-redaction.webp [:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" }
-下載 +Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) -- [:octicons-globe-16: 網頁版](https://0xacab.org/jvoisin/mat2#web-interface) +- [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface)
@@ -51,10 +51,10 @@ cover: data-redaction.webp **ExifEraser** 是 Android 的現代無需許可的圖像中繼資料擦除應用程式。 -它目前支援JPEG , PNG和WebP 檔案格式。 +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md index cc926fcb..5ee3a29c 100644 --- a/i18n/zh-Hant/desktop-browsers.md +++ b/i18n/zh-Hant/desktop-browsers.md @@ -91,7 +91,7 @@ schema: Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. 如果您希望更深入地調整瀏覽器設定,且您不擔心瀏覽器指紋被識別,我們推薦使用 [Firefox](#firefox)。 diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 3510c62b..a1bc7141 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -24,8 +24,8 @@ cover: desktop.webp **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora 通常會比其他發行版先採用較新的技術 (例如 [Wayland](https://wayland.freedesktop.org) 和 [PipeWire](https://pipewire.org))。 這些新技術通常會在安全性、隱私性和可用性方面有所改善。 [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -45,9 +45,9 @@ Fedora 有一個半滾動的發布週期。 While some packages like the desktop openSUSE Tumbleweed 使用 [Btrfs](https://zh.wikipedia.org/wiki/Btrfs) 和 [Snapper](https://zh.opensuse.org/openSUSE:Snapper_Tutorial) 以確保一旦發生問題,快照可以回滾。 -[:octicons-home-16: 首頁](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=說明文件} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -63,9 +63,9 @@ Tumbleweed 遵循滾動發佈模式,每個更新都是快照發布。 當您 **Arch Linux** 是一個輕量級、自助式 (DIY) 的發行版,也就是說,您只會得到您所安裝的東西。 如需更多資訊,請參閱他們的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。 -[:octicons-home-16: 首頁](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=說明文件} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ Arch Linux有一個滾動發佈週期。 沒有固定的發布時間表,套件 **Fedora Atomic Desktops** 是 Fedora 的變體,它使用「rpm-ostree」套件管理器,專注於容器化工作流程和桌面應用程式的 Flatpak。 這些變體版都遵循 Fedora Workstation 同樣的發佈時間表,受益於相同的快速更新並保持非常接近上遊。 [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -115,9 +115,9 @@ These operating systems differ from Fedora Workstation as they replace the [DNF] NixOS 是基於 Nix套件管理器的獨立發行版,專注於可重複性和可靠性。 -[:octicons-home-16: 首頁](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=說明文件} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -143,10 +143,10 @@ Nix是一個基於源的套件管理器;如果二進位快取中沒有預先 **Whonix** 為基於 [Kicksecure](#kicksecure) 專注在安全的 Debian 分支系統。 其目的是在網際網路上提供隱私、安全性和 [:material-incognito: 匿名](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple }。 Whonix 最好與 [Qubes OS](#qubes-os) 配合使用。 -[:octicons-home-16: 首頁](https://whonix.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="洋蔥服務" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=說明文件} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -166,9 +166,9 @@ Whonix 最好 [與 Qubes 結合使用](https://whonix.org/wiki/Qubes/Why_use_Qub **Tails** 是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD , USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 它使用 [Tor](tor.md) 來維護 隱私 和 [:material-incognito: 匿名](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } ,同時規避審查,而且在關閉電源後,它不會在使用的電腦上留下任何痕跡。 -[:octicons-home-16: 首頁](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=說明文件} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -201,12 +201,12 @@ Tails Tor 瀏覽器預設包含 [uBlock Origin](browser-extensions.md#ublock-ori **Qubes OS** 是開源作業系統,利用安全的虛擬器為桌面運算提供更強的安全性 (或稱"qubes"). Qubes 基於 Xen, X Window 系統與 Linux。 大多數 Linux 應用它都可以執行且適用 Linux 驅動。 -[:octicons-home-16: 首頁](https://qubes-os.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="洋蔥服務" } -[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=說明文件 } -[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="原始碼" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" } @@ -245,11 +245,11 @@ Secureblue also provides GrapheneOS's [hardened memory allocator](https://github **Kicksecure** ──如要簡單的介紹它:可以說是一組腳本、配置與套件的組合;可大幅減少 Debian 的攻擊面。 它預設涵蓋了大量隱私和加固建議。 它也是 [Whonix](#whonix) 的基礎作業系統。 -[:octicons-home-16: 首頁](https://kicksecure.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=說明文件 } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="原始碼" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" } diff --git a/i18n/zh-Hant/device-integrity.md b/i18n/zh-Hant/device-integrity.md index d81a0232..459fc340 100644 --- a/i18n/zh-Hant/device-integrity.md +++ b/i18n/zh-Hant/device-integrity.md @@ -78,7 +78,7 @@ robots: nofollow, max-snippet:-1, max-image-preview:large [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) - [:simple-linux: Linux](https://docs.mvt.re/en/latest/install) @@ -122,7 +122,7 @@ MVT 對掃描 iOS 裝置「最」有用。 Android 儲存的診斷資訊非常 [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=說明文件}
-下載 +Downloads - [:fontawesome-brands-windows: Windows](https://imazing.com/download) - [:simple-apple: macOS](https://imazing.com/download) @@ -165,7 +165,7 @@ iMazing 會自動並以互動方式引導完成使用 [MVT](#mobile-verification [:octicons-heart-16:](https://attestation.app/donate){ .card-link title=捐款 }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play) - [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases) diff --git a/i18n/zh-Hant/dns.md b/i18n/zh-Hant/dns.md index 59a960e8..0b22044b 100644 --- a/i18n/zh-Hant/dns.md +++ b/i18n/zh-Hant/dns.md @@ -85,10 +85,10 @@ These DNS filtering solutions offer a web dashboard where you can customize the **Control D** 可自訂的 DNS 服務,可在 DNS 層級封鎖安全性威脅、不必要的內容和廣告。 付費方案之外,他們還提供許多可免費使用的預先配置 DNS 解析器。 -[:octicons-home-16: 首頁](https://controld.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
Downloads @@ -112,10 +112,10 @@ These DNS filtering solutions offer a web dashboard where you can customize the **NextDNS** 為可自訂的 DNS 服務,可在 DNS 層級封鎖安全性威脅、不必要的內容和廣告。 他們提供功能齊全的免費計劃,但使用受限。 -[:octicons-home-16: 首頁](https://nextdns.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
Downloads @@ -149,10 +149,10 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove **RethinkDNS** is an open-source Android client that supports [DoH](advanced/dns-overview.md#dns-over-https-doh), [DoT](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) and DNS Proxy. 它還提供附加功能,例如快取 DNS 回應、本機記錄 DNS 查詢以及使用應用程式作為防火牆。 -[:octicons-home-16: 首頁](https://rethinkdns.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
下載 @@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: 儲存庫](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="原始碼" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=捐款 } +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
下載 diff --git a/i18n/zh-Hant/document-collaboration.md b/i18n/zh-Hant/document-collaboration.md index e1022186..243a6b19 100644 --- a/i18n/zh-Hant/document-collaboration.md +++ b/i18n/zh-Hant/document-collaboration.md @@ -28,7 +28,7 @@ cover: document-collaboration.webp [:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=捐款 }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102) @@ -54,7 +54,7 @@ cover: document-collaboration.webp ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** 是流行辦公套件的替代方案,其設計優先考慮私密。 此網路服務上的所有內容都使用端對端加密,且可輕鬆與其他使用者分享。 [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** 是流行辦公套件的替代方案,其設計優先考慮私密。 此網路服務上的所有內容都使用端對端加密,且可輕鬆與其他使用者分享。 [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: 首頁](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="隱私權政策" } diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index 32659bb2..6e56e833 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -65,9 +65,9 @@ Cryptomator 的文件詳細介紹它的預期[安全目標](https://docs.cryptom **Picocrypt** 是一個小而簡單的加密工具,提供現代加密。 Picocrypt 使用安全的 XChaCha20 密碼和 Argon2id 金鑰派生功能來提供高級別的安全性。 它使用 Go 標準x/crypto 模塊作為其加密功能。 -[:octicons-repo-16: 儲存庫](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="原始碼" } -[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="捐款" } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" }
下載 @@ -207,9 +207,9 @@ Windows 的專業版、企業版和教育版均[正式支援](https://support.mi **LUKS** 是 Linux 預設 FDE 方法。 它可用於加密整個磁區、分割區或建立加密容器。 -[:octicons-home-16: 首頁](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="說明文件" } -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="原始碼" } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
diff --git a/i18n/zh-Hant/health-and-wellness.md b/i18n/zh-Hant/health-and-wellness.md index 97a5efc0..489e99c2 100644 --- a/i18n/zh-Hant/health-and-wellness.md +++ b/i18n/zh-Hant/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: 尊重隱私的 Android 和 iOS 健康應用程式 - Privacy Guides -title: 健康與保健 +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: 我們目前建議您在手機上使用這些應用程式來處理所有與健康相關的事務。 +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
@@ -155,7 +155,7 @@ CommonHealth is only available in the United States. Although the app itself is ## 標準 -\*\*請注意,我們與推薦的任何項目均無關。\*\*除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 ### 最低合格要求 diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md index fcad6b9c..9fde3159 100644 --- a/i18n/zh-Hant/index.md +++ b/i18n/zh-Hant/index.md @@ -114,6 +114,6 @@ schema: 許多人混淆了隱私權、安全性和匿名性的概念。 舉例來說,您會看到人們批評各種產品「不具隱私性」,但實際上他們的意思是不提供匿名性。 在本網站中,我們涵蓋了所有這三個主題,但重要的是您必須瞭解它們之間的差異,以及每種主題何時會發揮作用。 -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/zh-Hant/language-tools.md b/i18n/zh-Hant/language-tools.md index cb81fecf..5e002d6c 100644 --- a/i18n/zh-Hant/language-tools.md +++ b/i18n/zh-Hant/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: 服務提供商](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: 監控資本主義](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -輸入到文法、拼寫和樣式檢查器以及翻譯服務的文字可能包含敏感資訊,這些資訊可能無限期地儲存在伺服器上,並被出售給第三方。 The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +輸入到文法、拼寫和樣式檢查器以及翻譯服務的文字可能包含敏感資訊,這些資訊可能無限期地儲存在伺服器上,並被出售給第三方。 The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -21,19 +21,19 @@ cover: language-tools.webp **LanguageTool** is a multilingual grammar, style, and spell checker that supports more than 20 languages. According to their privacy policy, they do not store any content sent to their service for review, but for higher assurance the software is [self-hostable](https://dev.languagetool.org/http-server). -[:octicons-home-16: 首頁](https://languagetool.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=文檔} -[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
-下載 +Downloads - [:simple-appstore: App Store](https://apps.apple.com/app/id1534275760) - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/zh-Hant/maps.md b/i18n/zh-Hant/maps.md index de86d86c..9b03622f 100644 --- a/i18n/zh-Hant/maps.md +++ b/i18n/zh-Hant/maps.md @@ -20,7 +20,7 @@ cover: maps.webp ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** 是一款開放原始碼、社群開發的地圖顯示和衛星導航式導航應用程式,適合步行者、駕駛和自行車手使用。 此應用程式提供以 OpenStreetMap 資料為基礎的全球離線地圖,且提供尊重隱私的導航:無位置追蹤、無資料收集、無廣告。 此應用程式可完全離線使用。 +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. 此應用程式可完全離線使用。 功能包括自行車路線、登山步道和步行路線、帶有語音指示的逐向導航,以及大眾運輸路線規劃(僅在受支援的地區和城市提供)。 @@ -47,7 +47,7 @@ cover: maps.webp ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** 是基於 OpenStreetMap 的離線地圖和導航應用程式,提供步行、單車、汽機車以及大眾運輸的逐向導航。 它是開放原始碼,不會收集任何使用者資料。 +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: 首頁](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="隱私權政策" } @@ -58,30 +58,32 @@ cover: maps.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-相較於 Organic Maps,OsmAnd 有更多 [功能](https://wiki.openstreetmap.org/wiki/OsmAnd#Features),但使用起來也更複雜。 One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## 標準 -\*\*請注意,我們與推薦的任何項目均無關。\*\*除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 ### 最低合格要求 - 不得根據其隱私權政策收集 PII。 - 不得要求使用者建立帳戶。 -- 不得要求使用者共用位置資料。 如果使用者選擇分享其位置,則必須對此資料進行匿名處理。 -- 離線時必須保留核心功能,並允許使用者下載地圖以供離線使用。 +- Must not require users to share location data. If the user opts in to sharing their location, this data must be anonymized. +- Must retain core functionality when offline and allow users to download maps for offline use. ### 最佳情況 最佳情況標準代表我們希望在這個類別的完美項目的應具備的特性。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- 應用程式應該是開放原始碼的。 -- 應該有大眾運輸的路線規劃。 -- 應具有即時交通資訊,以便規劃路線。 +- Apps should be open source. +- Should have route planning for public transport. +- Should have real-time traffic information for route planning. - Should support advanced features such as detailed shop/point of interest (POI) information and reviews, topographic maps, and satellite and street view images. diff --git a/i18n/zh-Hant/meta/admonitions.md b/i18n/zh-Hant/meta/admonitions.md index 40e841da..aefb907a 100644 --- a/i18n/zh-Hant/meta/admonitions.md +++ b/i18n/zh-Hant/meta/admonitions.md @@ -3,7 +3,7 @@ title: 提醒 description: 網站撰稿人建立提醒的指南。 --- -**提醒**(或「補充說明」)是寫作者可以在文章中加入額外內容的選項,而不會影響文章的整體流暢度。 +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

提醒範例

@@ -41,7 +41,7 @@ description: 網站撰稿人建立提醒的指南。
``` -必須指定`TITLE`,如果不想要特定的標題,可以將其設置為與`TYPE` (請見下方) 相同的文字,並採用首字母大寫格式,例如`Note`。 `內文`必須使用 Markdown 格式。 +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. `內文`必須使用 Markdown 格式。 ### 一般類型 @@ -166,11 +166,11 @@ description: 網站撰稿人建立提醒的指南。 ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ description: 網站撰稿人建立提醒的指南。 ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ description: 網站撰稿人建立提醒的指南。 #### `downloads` -這是特別的可摺疊式提醒,用來產生下載連結區塊。 只與推薦卡一起使用,如上面的範例。 +This is a special type of collapsible admonition which is used to generate sections containing download links. 只與推薦卡一起使用,如上面的範例。 ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ description: 網站撰稿人建立提醒的指南。 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ description: 網站撰稿人建立提醒的指南。 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ description: 網站撰稿人建立提醒的指南。 ## 舊格式 -在網站中,您可能會看到一些格式與以下示範例類似的提醒內容: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**這個格式已不再被使用**,因為它不相容於 Crowdin 上面新版的翻譯軟體。 當您在網站上新增頁面時,只使用基於 HTML 的較新格式。 +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -舊格式的提醒內容暫時不需要急著轉換成新格式。 目前使用這個格式的網頁應該會繼續運作,但隨著網站更新,我們將會持續更新至基於 HTML 的較新格式。 +舊格式的提醒內容暫時不需要急著轉換成新格式。 Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/zh-Hant/news-aggregators.md b/i18n/zh-Hant/news-aggregators.md index f3892514..cd97823d 100644 --- a/i18n/zh-Hant/news-aggregators.md +++ b/i18n/zh-Hant/news-aggregators.md @@ -42,10 +42,10 @@ cover: news-aggregators.webp ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: 儲存庫](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="原始碼" } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
下載 @@ -62,9 +62,11 @@ cover: news-aggregators.webp ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** 是 Android 版本的 RSS 客戶端,具有許多 [特色](https://github.com/spacecowboy/Feeder#features) ,且可與RSS 訊息來源的資料夾配合使用。 It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** 是 Android 版本的 RSS 客戶端,具有許多 [特色](https://github.com/spacecowboy/Feeder#features) ,且可與RSS 訊息來源的資料夾配合使用。 -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ cover: news-aggregators.webp ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** 是一個網頁版的新聞聚合器,允許自行託管。 It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** 是一個網頁版的新聞聚合器,允許自行託管。 + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ cover: news-aggregators.webp ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** 是一款自由及開放原始碼的訊息源閱讀器,適用於 macOS 和 iOS ,專注於原生設計和功能集。 它支援典型的 Feed 格式與內建支援 Reddit Feed。 +**NetNewsWire** 是一款自由及開放原始碼的訊息源閱讀器,適用於 macOS 和 iOS ,專注於原生設計和功能集。 + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ cover: news-aggregators.webp **Newsboat** 是文字控制界面的RSS/Atom 新聞閱讀器。 分支自 [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter) 後,維持積極維護。 It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

範例

-欲透過 RSS 客戶端訂閱 YouTube 頻道,首先需要取得該頻道的 [頻道 ID](https://support.google.com/youtube/answer/6180214) 。 The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. 並替換下方的 [CHANNEL ID]: +欲透過 RSS 客戶端訂閱 YouTube 頻道,首先需要取得該頻道的 [頻道 ID](https://support.google.com/youtube/answer/6180214) 。 The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. 並替換下方的 [CHANNEL ID]: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index ebf37ed3..cb587edc 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -1,7 +1,7 @@ --- title: "記事本" icon: material/notebook-edit-outline -description: 這些加密的筆記錄應用程式可讓您跟進記錄,而無需將它們提供給第三方。 +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp 隨時紀錄您的筆記和日記,不需提供給第三方。 -如果您目前使用的是 Evernote、Google Keep 或 Microsoft OneNote 等應用程式,我們建議您在這裡選擇一個支援 E2EE 的替代方案。 +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## 雲端型 @@ -19,18 +19,20 @@ cover: notebooks.webp
-![Standard Notes 標誌](assets/img/notebooks/standard-notes.svg){ align=right } +![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** 是一款簡單而私密的筆記應用程式,可隨時隨地輕鬆使用筆記功能。 它在每個平臺上都採納 E2EE ,並且其電腦版具有強大的主題和自訂編輯器功能。 它也作過 [獨立稽核](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit) 。 +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. 它在每個平臺上都採納 E2EE ,並且其電腦版具有強大的主題和自訂編輯器功能。 -[:octicons-home-16: 首頁](https://standardnotes.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="原始碼" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=捐款 } +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). + +[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes) - [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450) @@ -38,7 +40,7 @@ cover: notebooks.webp - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: 網頁版](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,16 +54,18 @@ Standard Notes 已於 2024 年 4 月 10 日 [加入 Proton AG](https://standardn ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** 為自由(此同言論自由之意)且開放源代碼的筆記應用,其注重隱私、容易使用。 其跨平台的 E2EE 具備強大的同步功能以便您隨時隨地都能進行記錄。 可輕鬆透過其 [官方滙入程式](https://importer.notesnook.com) 從 Evernote、OneNote 及許多類似的筆記應用來滙入資料。 +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. -[:octicons-home-16: 首頁](https://notesnook.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=捐款 } +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). + +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) - [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) @@ -69,10 +73,10 @@ Standard Notes 已於 2024 年 4 月 10 日 [加入 Proton AG](https://standardn - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: 網頁版](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,16 +88,18 @@ Standard Notes 已於 2024 年 4 月 10 日 [加入 Proton AG](https://standardn ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** 是一款自由、開放原始碼且功能完整的筆記與待辦事項應用程式,可將許多 markdown 筆記統整成筆記本與標籤。 它提供E2EE ,可以通過Nextcloud , Dropbox等同步。 它也可以輕鬆的從 Evernote 和純文本筆記導入。 +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. -[:octicons-home-16: 首頁](https://joplinapp.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="原始碼" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=捐款 } +It can sync through Nextcloud, Dropbox, and more. 它也可以輕鬆的從 Evernote 和純文本筆記導入。 + +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) - [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) @@ -102,13 +108,13 @@ Standard Notes 已於 2024 年 4 月 10 日 [加入 Proton AG](https://standardn - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin 不 [支援](https://github.com/laurent22/joplin/issues/289) 應用程式自身或個別筆記的 password/PIN 保護。 但是您的資料在傳輸與同步過程中仍會使用主金鑰加密。 2023 年 1 月起 Joplin [支援](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) Android 和 iOS 生物辨識應用鎖。 +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. 但是您的資料在傳輸與同步過程中仍會使用主金鑰加密。 Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin 不 [支援](https://github.com/laurent22/joplin/issues/289) 應用程式 ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** 是一個開源的,基於網頁的 E2EE 文件編輯器和照片儲存應用程式。 Cryptee 為漸進式網路應用程式(PWA) ,這意味著它可以在所有現代裝置上無縫工作,而無需為每個平臺提供原生應用程式。 +**Cryptee** 是一個開源的,基於網頁的 E2EE 文件編輯器和照片儲存應用程式。 -[:octicons-home-16: 首頁](https://crypt.ee){ .md-button .md-button--primary } -[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/cryptee){ .card-link title="原始碼" } +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. + +[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } +[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
-下載 +Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee 免費提供 100MB 的儲存空間,如果需要更多容量,則另有付費選項。 註冊不需要電子郵件或其他個人身份資訊。 +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## 本地端的記事簿 @@ -143,12 +151,12 @@ Cryptee 免費提供 100MB 的儲存空間,如果需要更多容量,則另 ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** 是GNU Emacs的 [主要模式](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html)。 Org-mode 用於記錄筆記,維護待辦事項列表,規劃項目以及使用快速有效的純文字系統撰寫文件。 可以利用 [檔案同步](file-sharing.md#file-sync) 工具進行同步。 +**Org-mode** 是GNU Emacs的 [主要模式](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html)。 Org-mode 用於記錄筆記,維護待辦事項列表,規劃項目以及使用快速有效的純文字系統撰寫文件。 File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). -[:octicons-home-16: 首頁](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=說明文件} -[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="原始碼" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } +[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/zh-Hant/office-suites.md b/i18n/zh-Hant/office-suites.md index d3950576..ca629795 100644 --- a/i18n/zh-Hant/office-suites.md +++ b/i18n/zh-Hant/office-suites.md @@ -53,7 +53,7 @@ cover: office-suites.webp :octicons-code-16:{ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index 053eee3c..14e3cd46 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -128,14 +128,14 @@ schema: **密碼管理器**可讓您使用主密碼安全地儲存和管理密碼及其他憑證。 -[密碼介紹 :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[密碼介紹 :material-arrow-right-drop-circle:](basics/passwords-overview.md)

資訊

瀏覽器和作業系統所內建的密碼管理器常常不如專用密碼管理器軟體。 內建密碼管理器的優點在於與原生軟體的良好整合,但它通常功能較少,而且缺乏獨立產品所具有的隱私和安全特點。 -例如,Microsoft Edge 的密碼管理器根本不提供 E2EE。 Google的密碼管理員則 [須自行啟用](https://support.google.com/accounts/answer/11350823) E2EE,而 [Apple](https://support.apple.com/HT202303) 預設提供E2EE。 +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google的密碼管理員則 [須自行啟用](https://support.google.com/accounts/answer/11350823) E2EE,而 [Apple](https://support.apple.com/HT202303) 預設提供E2EE。
@@ -157,7 +157,7 @@ schema: [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) @@ -167,15 +167,15 @@ schema: - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden 預設使用 [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) 作為其 金鑰衍生函式(KDF) 演算法。 它也提供更安全的 [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id) 作為可選方案。 您可以在 web vault 中變更帳戶的 KDF 演算法。 +Bitwarden 預設使用 [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) 作為其 金鑰衍生函式(KDF) 演算法。 它也提供更安全的 [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id) 作為可選方案。 You can change your account's KDF algorithm in the web vault: - [x] 選擇**設定 > 安全 > 金鑰 > KDF 演算法 > Argon2id** @@ -201,15 +201,15 @@ Bitwarden 伺服器端代碼是 [開源的](https://github.com/bitwarden/server) [:octicons-code-16:](https://github.com/protonpass){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-browser-16: 網頁版](https://pass.proton.me) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) +- [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,14 +229,16 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6 ![1Password 標誌](assets/img/password-management/1password.svg){ align=right } -**1Password** 是強調安全性與易用性的密碼管理器,可讓您將密碼、金鑰、信用卡、軟體許可證以及其他任何敏感資訊儲存於安全的數位保險庫中。 您的保管庫託管在 1Password 伺服器,費用為 [每月收取](https://1password.com/sign-up/)。 1Password 定期 [接受審計](https://support.1password.com/security-assessments/) 並提供卓越的客戶支援。 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 +**1Password** 是強調安全性與易用性的密碼管理器,可讓您將密碼、金鑰、信用卡、軟體許可證以及其他任何敏感資訊儲存於安全的數位保險庫中。 您的保管庫託管在 1Password 伺服器,費用為 [每月收取](https://1password.com/sign-up/)。 + +1Password 定期 [接受審計](https://support.1password.com/security-assessments/) 並提供卓越的客戶支援。 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 [:octicons-home-16: 首頁](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="隱私權政策" } [:octicons-info-16:](https://support.1password.com){ .card-link title="說明文件" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) @@ -244,16 +246,16 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6 - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) -- [:octicons-browser-16: 網頁版](https://my.1password.com/signin) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) +- [:octicons-browser-16: Web](https://my.1password.com/signin)
-過去 1Password 僅為 macOS 和 iOS 的用戶提供最佳的密碼管理器用戶體驗,不過它現在已在所有平臺上實現了同等優秀的用戶體驗。 1Password 的用戶端擁有許多面向家庭和不熟悉技術人士的功能,例如直觀的 UI,方便使用和導覽,以及先進的功能。 值得注意的是,1Password 的幾乎所有功能都可在其原生行動或桌面用戶端中使用。 +過去 1Password 僅為 macOS 和 iOS 的用戶提供最佳的密碼管理器用戶體驗,不過它現在已在所有平臺上實現了同等優秀的用戶體驗。 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. 值得注意的是,1Password 的幾乎所有功能都可在其原生行動或桌面用戶端中使用。 您的 1Password 儲存庫使用您的主密碼和隨機化的 34 個字元安全金鑰來保護,以加密您在其伺服器上的資料。 此安全金鑰為您的資料添加了一層保護,因為無論您的主密碼如何,資料都受到高熵保護。 許多其他密碼管理器解決方案完全依賴於您的主密碼的強度來保護您的數據。 @@ -271,12 +273,12 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6 [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -325,14 +327,14 @@ Psono 為其產品提供廣泛的說明文件。 Psono 的網路用戶端可以 [:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="捐款" }
-下載 +Downloads - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,12 +348,12 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** 是適用於 Android 的輕量級密碼管理器;可在單一檔案中以 KeePass 格式編輯加密資料,並能以安全的方式提供自動填入功能。 應用程式的 [專業版](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) 可讓您解鎖外觀和非標準協定功能;但更重要的是,它有助於並鼓勵開發。 +**KeePassDX** 是適用於 Android 的輕量級密碼管理器;可在單一檔案中以 KeePass 格式編輯加密資料,並能以安全的方式提供自動填入功能。 -[:octicons-home-16: 首頁](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="說明文件" } -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="原始碼" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="捐款" } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
下載 @@ -363,6 +365,8 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
@@ -390,6 +394,6 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- ### 標準 -**請注意,我們與推薦的任何項目均無關。**除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用專案前先熟悉此清單,並自行進行研究,以確保它是適合您的選擇。 +**請注意,我們與推薦的任何項目均無關。**除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 - 必須跨平台。 diff --git a/i18n/zh-Hant/pastebins.md b/i18n/zh-Hant/pastebins.md index 6ac51eec..34c7d79e 100644 --- a/i18n/zh-Hant/pastebins.md +++ b/i18n/zh-Hant/pastebins.md @@ -17,12 +17,12 @@ cover: pastebins.webp ![PrivateBin 標誌](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** 是一個簡約、開放原始碼的線上平臺,伺服器對貼上的資料完全不知情。 資料在瀏覽器中使用 256 位元 AES 加密/解密。 它是 ZeroBin 的改良版。 +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. 資料在瀏覽器中使用 256 位元 AES 加密/解密。 它是 ZeroBin 的改良版。 -[:octicons-home-16: 首頁](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="公開實例"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### 最低要求 - 必須開放原始碼。 -- 必須實施「零信任」端對端加密。 +- Must implement "zero-trust" E2EE. - 必須支援密碼保護檔案。 ### 最佳情況 最佳情況標準代表我們希望在這個類別的完美項目的應具備的特性。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 -- 應擁有聲譽良好的獨立第三方所公佈的稽核。 +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/zh-Hant/photo-management.md b/i18n/zh-Hant/photo-management.md index 4b7982e1..8599430c 100644 --- a/i18n/zh-Hant/photo-management.md +++ b/i18n/zh-Hant/photo-management.md @@ -1,7 +1,7 @@ --- title: 照片管理 icon: material/image -description: 照片管理工具可確保個人照片免受雲端儲存提供者的窺視和其他未經授權的存取。 +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,30 +18,32 @@ cover: photo-management.webp ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos**提供端對端加密照片備份服務,支援 iOS 和 Android 的自動備份。 其客戶端和伺服器端的程式碼都完全開源。 它也可 [自行託管](https://github.com/ente-io/ente/tree/main/server#self-hosting)。 The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos**提供端對端加密照片備份服務,支援 iOS 和 Android 的自動備份。 Their code is fully open source, both on the client side and on the server side. 它也可 [自行託管](https://github.com/ente-io/ente/tree/main/server#self-hosting)。 -[:octicons-home-16: 首頁](https://ente.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="原始碼" } +The free plan offers 5 GB of storage as long as you use the service at least once a year. + +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: 網頁版](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
-Ente Photos 於 2023 年 3 月接受 [Cure53 稽核](https://ente.io/blog/cryptography-audit) ,並於 2023 年 4 月接受 [Fallible 稽核](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) 。 +Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. ## Stingle @@ -50,18 +52,19 @@ Ente Photos 於 2023 年 3 月接受 [Cure53 稽核](https://ente.io/blog/crypto ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** 是一款照片庫與相機應用程式,內建端對端加密備份與同步功能,可儲存您的相片與影片。 Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. -[:octicons-home-16: 首頁](https://stingle.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/stingle){ .card-link title="原始碼" } +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. + +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -75,15 +78,15 @@ Ente Photos 於 2023 年 3 月接受 [Cure53 稽核](https://ente.io/blog/crypto ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** 是一個可 自行託管 的相片管理平台。 它支援相簿同步與分享,以及多個 [功能](https://photoprism.app/features)。 它在設計上未採納 E2EE,因此最好託管在您信任且在您控制之下的伺服器上。 +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: 首頁](https://photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-下載 +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -93,12 +96,12 @@ Ente Photos 於 2023 年 3 月接受 [Cure53 稽核](https://ente.io/blog/crypto ## 標準 -\*\*請注意,我們與推薦的任何項目均無關。\*\*除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 ### 最低合格要求 -- 雲端託管提供商必須強制執行端對端加密。 -- 必須提供免費方案或試用期以進行測試。 +- Cloud-hosted providers must enforce E2EE. +- 必須提供免費計劃或試用期以進行測試。 - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 必須提供支援基本檔案管理功能的網頁介面。 - 允許輕鬆匯出所有檔案/文件。 @@ -106,4 +109,4 @@ Ente Photos 於 2023 年 3 月接受 [Cure53 稽核](https://ente.io/blog/crypto ### 最佳實踐 -- 應有來自聲譽良好、獨立的第三方公開稽核報告。 +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/zh-Hant/privacy.md b/i18n/zh-Hant/privacy.md index 0b0ca194..65971cf2 100644 --- a/i18n/zh-Hant/privacy.md +++ b/i18n/zh-Hant/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 1cc15e8a..975fbae4 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp 這些是我們所推薦的加密 **實時通訊軟體**。 它們涵蓋了 [多種通訊網路類型](./advanced/communication-network-types.md)。 -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 加密通訊軟體 diff --git a/i18n/zh-Hant/security-keys.md b/i18n/zh-Hant/security-keys.md index 5507a13e..5de8fcfe 100644 --- a/i18n/zh-Hant/security-keys.md +++ b/i18n/zh-Hant/security-keys.md @@ -118,7 +118,7 @@ Resetting the OpenPGP interface on a Nitrokey [Pro 2](https://docs.nitrokey.com/ ## 標準 -\*\*請注意,我們與推薦的任何項目均無關。\*\*除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 ### 最低合格要求 diff --git a/i18n/zh-Hant/social-networks.md b/i18n/zh-Hant/social-networks.md index cc85daa3..e557132e 100644 --- a/i18n/zh-Hant/social-networks.md +++ b/i18n/zh-Hant/social-networks.md @@ -189,7 +189,7 @@ With this setting enabled, unverified users (i.e., those who have not used the * ## 標準 -\*\*請注意,我們與推薦的任何項目均無關。\*\*除了[我們的通用標準](about/criteria.md)外,我們還制定了一套明確的要求,以便我們能夠提供客觀的建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 +**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。 - Must be free and open-source software. - 必須使用聯邦式通訊協定與社交網路軟體的其他實例通訊。 diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 9649bf30..fbce728b 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -354,7 +354,7 @@ description: Privacy Guides 社群所推薦的隱私工具、服務、軟體及
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index 6b24ff32..8d90a18a 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -31,7 +31,7 @@ schema: **Tor** 網路是一組由志願者操作的伺服器,可讓您免費連線,並改善您的隱私權和安全性。 個人和組織還可以通過 Tor 網路與“.onion 隱藏服務”分享資訊,而不會侵犯他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

溫馨提示

@@ -42,7 +42,7 @@ schema: 從裝置連線到 Tor 網路的方式有多種,最常用的是 **Tor 瀏覽器** ,它是 Firefox 的分叉,專為在電腦和Android上 [:material-incognito: 匿名](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} 瀏覽而設計 -其些應用程式比其他應用程式更好,但再次提醒其選用決定取決於您的威脅模型。 If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. 越多人使用 Tor 有助於減少 Tor 的不良印記,降低 ISP 和政府可能編制的「Tor 用戶清單」內容。 +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. 越多人使用 Tor 有助於減少 Tor 的不良印記,降低 ISP 和政府可能編制的「Tor 用戶清單」內容。 如果更完全的匿名至關重要,則應 **僅使用** 桌面版的 Tor 客戶端應用,最好再加上[Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) 一起搭配使用。 Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ schema:
-![Tor 瀏覽器標誌](assets/img/browsers/tor.svg){ align=right } +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -**Tor 瀏覽器** 需要匿名的好選擇,為您提供 Tor 網路和橋接的存取權限,它包含預設設定和擴展其自動配置安全級別有: *標準* 、 *較安全*和*最安全*三種。 +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: 首頁](https://torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="洋蔥服務" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=文檔 } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="原始碼" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=捐款 } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
下載 @@ -80,7 +80,7 @@ schema:
-Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 因此, **不應** 修改瀏覽器超出預設 [安全級別](https://tb-manual.torproject.org/security-settings)。 When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 因此, **不應** 修改瀏覽器超出預設 [安全級別](https://tb-manual.torproject.org/security-settings)。 When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. 除了直接在電腦安裝 Tor 瀏覽器外,還有專門設計用於連接到 Tor 網路的操作系統,例如 [Qubes OS 作業系統](desktop.md#qubes-os) + [Whonix](desktop.md#whonix) ,它們提供比標準 Tor 瀏覽器更高的安全性和保護。 @@ -90,13 +90,15 @@ Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion 瀏覽器** 是開源瀏覽器,其可讓您在 iOS 設備上匿名瀏覽 Tor 網路,其有 [Tor Project](https://support.torproject.org/glossary/onion-browser/)之保證。 [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion 瀏覽器** 是開源瀏覽器,其可讓您在 iOS 設備上匿名瀏覽 Tor 網路,其有 [Tor Project](https://support.torproject.org/glossary/onion-browser/)之保證。 + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
下載 diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 75b9c2ae..86ff4209 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -142,11 +142,12 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit [:octicons-code-16:](https://github.com/ivpn){ .card-link title="原始碼" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux) diff --git a/i18n/zh/about/donation-acceptance-policy.md b/i18n/zh/about/donation-acceptance-policy.md index 890a8cb0..c3ec73d3 100644 --- a/i18n/zh/about/donation-acceptance-policy.md +++ b/i18n/zh/about/donation-acceptance-policy.md @@ -45,7 +45,7 @@ Examples of gifts which are too restrictive include: - Those which are too difficult for us to administer. - Those that are for purposes outside our general mission. -An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos/) production, or hosting our website and forum. +An example of an acceptable restriction could be a gift towards funding our [video](https://www.privacyguides.org/videos) production, or hosting our website and forum. Final decisions on the restrictive nature of a gift and its acceptance or refusal will be made by our executive committee. diff --git a/i18n/zh/about/jobs.md b/i18n/zh/about/jobs.md index 59b87273..6a5909b3 100644 --- a/i18n/zh/about/jobs.md +++ b/i18n/zh/about/jobs.md @@ -3,7 +3,7 @@ title: Job Openings description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here. --- -Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause. +Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed here. Please consider donating to support our cause. We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below. diff --git a/i18n/zh/advanced/communication-network-types.md b/i18n/zh/advanced/communication-network-types.md index 48f0c2cb..28f8b9ac 100644 --- a/i18n/zh/advanced/communication-network-types.md +++ b/i18n/zh/advanced/communication-network-types.md @@ -6,7 +6,7 @@ description: 即时信息应用程序常用的几种网络架构的概述。 有几种网络架构常用于人与人之间的信息传递。 这些网络可以提供不同的隐私保证,这就是为什么在决定使用哪种应用程序时,应该考虑你的 [威胁模型](../basics/threat-modeling.md)。 -[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[Recommended Instant Messengers](../real-time-communication.md ""){.md-button} [:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 集中式网络 diff --git a/i18n/zh/advanced/tor-overview.md b/i18n/zh/advanced/tor-overview.md index d8439290..01cd23f9 100644 --- a/i18n/zh/advanced/tor-overview.md +++ b/i18n/zh/advanced/tor-overview.md @@ -8,9 +8,9 @@ description: Tor是一个免费使用的去中心化网络,专为尽量隐私 [**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得当,该网络可以实现隐私且匿名地浏览和通信。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 -[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button} -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 +Tor works by routing your internet traffic through volunteer-operated servers instead of making a direct connection to the site you're trying to visit. 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -35,13 +35,13 @@ Because we already [generally recommend](../basics/vpn-overview.md) that the vas Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. -Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: +Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal (e.g., through Tor Browser). This creates a connection chain like so: - [x] You → VPN → Tor → Internet From your ISP's perspective, it looks like you're accessing a VPN normally (with the associated cover that provides you). From your VPN's perspective, they can see that you are connecting to the Tor network, but nothing about what websites you're accessing. From Tor's perspective, you're connecting normally, but in the unlikely event of some sort of Tor network compromise, only your VPN's IP would be exposed, and your VPN would *additionally* have to be compromised to deanonymize you. -This is **not** censorship circumvention advice, because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. +This is **not** censorship circumvention advice because if Tor is blocked entirely by your ISP, your VPN likely is as well. Rather, this recommendation aims to make your traffic blend in better with commonplace VPN user traffic, and provide you with some level of plausible deniability by obscuring the fact that you're connecting to Tor from your ISP. --- @@ -51,7 +51,7 @@ We **very strongly discourage** combining Tor with a VPN in any other manner. Do - You → VPN → Tor → VPN → Internet - Any other configuration -Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. +Some VPN providers and other publications will occasionally recommend these **bad** configurations to evade Tor bans (i.e., exit nodes being blocked by websites) in some places. [Normally](https://support.torproject.org/#about_change-paths), Tor frequently changes your circuit path through the network. When you choose a permanent *destination* VPN (connecting to a VPN server *after* Tor), you're eliminating this advantage and drastically harming your anonymity. Setting up bad configurations like these is difficult to do accidentally, because it usually involves either setting up custom proxy settings inside Tor Browser, or setting up custom proxy settings inside your VPN client which routes your VPN traffic through the Tor Browser. As long as you avoid these non-default configurations, you're probably fine. @@ -60,7 +60,7 @@ Setting up bad configurations like these is difficult to do accidentally, becaus

VPN/SSH Fingerprinting

-The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited, because all websites have specific traffic patterns. +The Tor Project [notes](https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorPlusVPN#vpnssh-fingerprinting) that *theoretically* using a VPN to hide Tor activities from your ISP may not be foolproof. VPNs have been found to be vulnerable to website traffic fingerprinting, where an adversary can still guess what website is being visited because all websites have specific traffic patterns. Therefore, it's not unreasonable to believe that encrypted Tor traffic hidden by a VPN could also be detected via similar methods. There are no research papers on this subject, and we still consider the benefits of using a VPN to far outweigh these risks, but it is something to keep in mind. @@ -68,11 +68,11 @@ If you still believe that pluggable transports (bridges) provide additional prot
-Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. +Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. To reiterate, though, you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network in most cases. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g., Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels. ## What Tor is Not -The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. +The Tor network is not the perfect privacy protection tool in all cases and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you. ### Tor is not a free VPN @@ -80,26 +80,26 @@ The release of the *Orbot* mobile app has lead many people to describe Tor as a Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#caveats). Because Tor exit nodes can be created by anybody, they are hotspots for network logging and modification. In 2020, many Tor exit nodes were documented to be downgrading HTTPS traffic to HTTP in order to [hijack cryptocurrency transactions](https://therecord.media/thousands-of-tor-exit-nodes-attacked-cryptocurrency-users-over-the-past-year). Other exit node attacks such as replacing downloads via unencrypted channels with malware have also been observed. HTTPS does mitigate these threats to an extent. -As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. +As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs. As such, using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc. ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project doesn't provide any tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. -Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. +Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect—they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. It is critical to understand the difference between bypassing censorship and evading detection. It is easier to accomplish the former because of the many real-world limitations on what network censors can realistically do en masse, but these techniques do not hide the fact that you—*specifically* you—are using Tor from an interested party monitoring your network. ### Tor Browser is not the most *secure* browser -Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. +Anonymity can often be at odds with security: Tor's anonymity requires every user to be identical, which creates a monoculture (e.g., the same bugs are present across all Tor Browser users). As a cybersecurity rule of thumb, monocultures are generally regarded as bad: Security through diversity (which Tor lacks) provides natural segmentation by limiting vulnerabilities to smaller groups, and is therefore usually desirable, but this diversity is also less good for anonymity. Additionally, Tor Browser is based on Firefox's Extended Support Release builds, which only receives patches for vulnerabilities considered *Critical* and *High* (not *Medium* and *Low*). This means that attackers could (for example): 1. Look for new Critical/High vulnerabilities in Firefox nightly or beta builds, then check if they are exploitable in Tor Browser (this vulnerability period can last weeks). 2. Chain *multiple* Medium/Low vulnerabilities together until they get the level of access they're looking for (this vulnerability period can last months or longer). -Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure VM and protect against leaks. +Those at risk of browser vulnerabilities should consider additional protections to defend against Tor Browser exploits, such as using Whonix in [Qubes](../os/qubes-overview.md) to contain your Tor browsing in a secure virtual machine and protect against leaks. ## 建立通往公开网络服务的链路 @@ -137,7 +137,7 @@ Those at risk of browser vulnerabilities should consider additional protections 暗网服务是只能通过 Tor 浏览器访问的网站。 这些网站有一个以 `.onion` 结尾的随机生成的长域名。 -在 Tor 中连接到暗网服务的工作原理与连接到公网服务非常相似,但在到达目的地服务器之前,你的流量会经过**六个**节点。 不过,和前面一样,这些节点中只有三个有助于*你*的匿名性,其他三个节点保护*暗网服务*的匿名性,隐藏网站的真实 IP 和位置,就像 Tor 浏览器隐藏你的网站一样。 +在 Tor 中连接到暗网服务的工作原理与连接到公网服务非常相似,但在到达目的地服务器之前,你的流量会经过**六个**节点。 Just like before, however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
![显示您的流量通过三个 Tor 节点以及另外三个隐藏暗网服务身份的 Tor 节点的 Tor 链路](.../assets/img/how-tor-works/tor-path-hidden-service.svg#only-light) @@ -147,15 +147,15 @@ Those at risk of browser vulnerabilities should consider additional protections ## 加密 -Tor用出口、中间和入口节点的密钥对每个数据包(一个传输的数据块)进行三次加密--按顺序进行。 +Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node in that order. 一旦Tor建立了一个电路,数据传输就会按以下方式进行。 -1. 首先:当数据包到达入口节点时,第一层的加密被移除。 在这个加密的数据包中,入口节点会发现另一个带有中间节点地址的加密数据包。 然后,入口节点将把数据包转发给中间节点。 +1. Firstly: When the packet arrives at the entry node, the first layer of encryption is removed. 在这个加密的数据包中,入口节点会发现另一个带有中间节点地址的加密数据包。 然后,入口节点将把数据包转发给中间节点。 -2. 第二:当中间节点收到来自入口节点的数据包时,它也会用自己的密钥去掉一层加密,这时会发现一个带有出口节点地址的加密数据包。 然后,中间节点将把数据包转发给出口节点。 +2. Secondly: When the middle node receives the packet from the entry node, it too will remove a layer of encryption with its key, and this time finds an encrypted packet with the exit node's address. 然后,中间节点将把数据包转发给出口节点。 -3. 最后:当出口节点收到其数据包时,它将用其密钥去除最后一层加密。 出口节点将看到目标地址并将数据包转发到该地址。 +3. Lastly: When the exit node receives its packet, it will remove the last layer of encryption with its key. 出口节点将看到目标地址并将数据包转发到该地址。 下面是一个显示该过程的替代图。 每个节点都会移除自己的加密层,而当目的地服务器返回数据时,同样的过程会完全反向发生。 例如,出口节点不知道你是谁,但它知道它来自哪个节点,因此它添加了自己的加密层并将其发送回来。 @@ -185,7 +185,7 @@ Tor用出口、中间和入口节点的密钥对每个数据包(一个传输 Tor bridges are commonly touted as an alternative method to hiding Tor usage from an ISP, instead of a VPN (as we suggest using if possible). Something to consider is that while bridges may provide adequate censorship circumvention, this is only a *transient* benefit. They do not adequately protect you from your ISP discovering you connected to Tor in the *past* with historical traffic log analysis. -To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges, they are discovered and blocked relatively frequently, just not immediately. +To illustrate this point, consider the following scenario: You connect to Tor via a bridge, and your ISP doesn’t detect it because they are not doing sophisticated analysis of your traffic, so things are working as intended. Now, 4 months go by, and the IP of your bridge has been made public. This is a very common occurrence with bridges; they are discovered and blocked relatively frequently, just not immediately. Your ISP wants to identify Tor users 4 months ago, and with their limited metadata logging they can see that you connected to an IP address which was later revealed to be a Tor bridge. You have virtually no other excuse to be making such a connection, so the ISP can say with very high confidence that you were a Tor user at that time. @@ -193,7 +193,7 @@ Contrast this with our recommended scenario, where you connect to Tor via a VPN. Because your ISP almost certainly is not capturing all packet-level data and storing it forever, they have no way of determining what you connected to with that VPN *after* the fact with an advanced technique like deep packet inspection, and therefore you have plausible deniability. -Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges, you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. +Therefore, bridges provide the most benefit when circumventing internet censorship *in the moment*, but they are not an adequate substitute for **all** the benefits that using a VPN alongside Tor can provide. Again, this is not advice *against* using Tor bridges—you should just be aware of these limitations while making your decision. In some cases bridges may be the *only* option (if all VPN providers are blocked, for instance), so you can still use them in those circumstances with this limitation in mind. If you think that a bridge can aid in defending against fingerprinting or other advanced network analysis more than a VPN's encrypted tunnel already can, you always have the option to use a bridge in conjunction with a VPN as well. That way you are still protected by the pluggable transport's obfuscation techniques even if an adversary gains some level of visibility into your VPN tunnel. If you decide to go this route, we recommend connecting to an obfs4 bridge behind your VPN for optimal fingerprinting protection, rather than meek or Snowflake. @@ -205,6 +205,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://youtube.com/watch?v=QRYzre4bf7I) (YouTube) - [Tor Onion Services - Computerphile](https://youtube.com/watch?v=lVcbq_a5N9I) (YouTube) -[^1]: 您线路上的第一个中继称为“入口警卫“或“警卫”。 它是一个快速而稳定的中继,会在2-3个月内持续作为你的线路的第一个中继,以防止已知的破坏匿名性的攻击。 你的线路其余部分会随着你访问的每个新网站而改变,所有这些中继器一起提供Tor的全部隐私保护。 关于警卫中继器如何工作的更多信息,请参阅这篇 [博文](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [关于入口警卫的论文](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) +[^1]: 您线路上的第一个中继称为“入口警卫“或“警卫”。 它是一个快速而稳定的中继,会在2-3个月内持续作为你的线路的第一个中继,以防止已知的破坏匿名性的攻击。 你的线路其余部分会随着你访问的每个新网站而改变,所有这些中继器一起提供Tor的全部隐私保护。 关于警卫中继器如何工作的更多信息,请参阅这篇 [博文](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [关于入口警卫的论文](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2](https://support.torproject.org/tbb/tbb-2)) -[^2]: 中继标志:由目录权限分配并在目录协议规范中进一步定义的线路位置(例如, “Guard”、“Exit”、“BadExit” )、线路属性(例如, “Fast”、“Stable” )或角色(例如, “Authority”、“HSDir” )的中继的特殊( dis- )限定。 ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) +[^2]: 中继标志:由目录权限分配并在目录协议规范中进一步定义的线路位置(例如, “Guard”、“Exit”、“BadExit” )、线路属性(例如, “Fast”、“Stable” )或角色(例如, “Authority”、“HSDir” )的中继的特殊( dis- )限定。 ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html#relay-flag)) diff --git a/i18n/zh/ai-chat.md b/i18n/zh/ai-chat.md index 399dccb1..fd2462c0 100644 --- a/i18n/zh/ai-chat.md +++ b/i18n/zh/ai-chat.md @@ -44,7 +44,7 @@ To run AI locally, you need both an AI model and an AI client. There are many permissively licensed models available to download. [Hugging Face](https://huggingface.co/models) is a platform that lets you browse, research, and download models in common formats like [GGUF](https://huggingface.co/docs/hub/en/gguf). Companies that provide good open-weights models include big names like Mistral, Meta, Microsoft, and Google. However, there are also many community models and [fine-tuned](https://en.wikipedia.org/wiki/Fine-tuning_\(deep_learning\)) models available. As mentioned above, quantized models offer the best balance between model quality and performance for those using consumer-grade hardware. -To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://www.nebuly.com/blog/llm-leaderboards). +To help you choose a model that fits your needs, you can look at leaderboards and benchmarks. The most widely-used leaderboard is the community-driven [LM Arena](https://lmarena.ai). Additionally, the [OpenLLM Leaderboard](https://huggingface.co/spaces/open-llm-leaderboard/open_llm_leaderboard) focuses on the performance of open-weights models on common benchmarks like [MMLU-Pro](https://arxiv.org/abs/2406.01574). There are also specialized benchmarks which measure factors like [emotional intelligence](https://eqbench.com), ["uncensored general intelligence"](https://huggingface.co/spaces/DontPlanToEnd/UGI-Leaderboard), and [many others](https://nebuly.com/blog/llm-leaderboards). ## AI Chat Clients @@ -67,7 +67,7 @@ To help you choose a model that fits your needs, you can look at leaderboards an In addition to supporting a large range of text models, Kobold.cpp also supports image generators such as [Stable Diffusion](https://stability.ai/stable-image) and automatic speech recognition tools such as [Whisper](https://github.com/ggerganov/whisper.cpp). -[:octicons-home-16: Homepage](https://github.com/LostRuins/koboldcpp){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/LostRuins/koboldcpp#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/LostRuins/koboldcpp/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/LostRuins/koboldcpp){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/LostRuins/koboldcpp/blob/2f3597c29abea8b6da28f21e714b6b24a5aca79b/SECURITY.md){ .card-link title="Security Policy" } @@ -124,14 +124,14 @@ Ollama simplifies the process of setting up a local AI chat by downloading the A
-![Llamafile Logo](assets/img/ai-chat/llamafile.png){align=right} +![Llamafile Logo](assets/img/ai-chat/llamafile.webp){align=right} **Llamafile** is a lightweight, single-file executable that allows users to run LLMs locally on their own computers without any setup involved. It is [backed by Mozilla](https://hacks.mozilla.org/2023/11/introducing-llamafile) and available on Linux, macOS, and Windows. Llamafile also supports LLaVA. However, it doesn't support speech recognition or image generation. -[:octicons-home-16: Homepage](https://github.com/Mozilla-Ocho/llamafile){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#llamafile){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Mozilla-Ocho/llamafile#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Mozilla-Ocho/llamafile#quickstart){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Mozilla-Ocho/llamafile){ .card-link title="Source Code" } [:octicons-lock-16:](https://github.com/Mozilla-Ocho/llamafile#security){ .card-link title="Security Policy" } diff --git a/i18n/zh/alternative-networks.md b/i18n/zh/alternative-networks.md index 7215eea0..ec73a71c 100644 --- a/i18n/zh/alternative-networks.md +++ b/i18n/zh/alternative-networks.md @@ -154,5 +154,6 @@ Also, unlike Tor, every I2P node will relay traffic for other users by default, There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. + [^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. - Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/zh/android/general-apps.md b/i18n/zh/android/general-apps.md index c66519ce..7c335885 100644 --- a/i18n/zh/android/general-apps.md +++ b/i18n/zh/android/general-apps.md @@ -70,7 +70,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a **Secure Camera** is a camera app focused on privacy and security which can capture images, videos, and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera#readme){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } @@ -116,7 +116,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure [Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content. -[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" } [:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } diff --git a/i18n/zh/basics/vpn-overview.md b/i18n/zh/basics/vpn-overview.md index d7371b0d..2abb30ff 100644 --- a/i18n/zh/basics/vpn-overview.md +++ b/i18n/zh/basics/vpn-overview.md @@ -7,7 +7,7 @@ description: Virtual Private Networks shift risk away from your ISP to a third-p Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. -[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/ ""){.md-button} +[:material-movie-open-play-outline: Video: Do you need a VPN?](https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn ""){.md-button} Normally, an ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem). Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns). diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md index 57e53b6f..4a4e7658 100644 --- a/i18n/zh/basics/why-privacy-matters.md +++ b/i18n/zh/basics/why-privacy-matters.md @@ -12,7 +12,7 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 许多人会混淆 **隐私**、 **安全**和 **匿名** 的概念。 例如,你会看到有人批评各种产品 "不私密",但他们的意思其实是这些产品不提供匿名性。 在本网站上,我们这三个主题都会介绍,但重要的是,你要了解它们之间的区别,以及每一个主题何时发挥作用。 -[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/ ""){.md-button} +[:material-movie-open-play-outline: Video: Stop Confusing Privacy, Anonymity, and Security](https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security ""){.md-button} **隐私** @@ -58,7 +58,7 @@ description: 在数据被大量利用的现代,你的隐私从未这样重要 隐私是我们使用的[软件和服务](../tools.md)中应该自带的东西,你无法强行让大多数你使用应用程序变得隐私。 -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } ## 资料来源 diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index d5c373b3..810e74ee 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -11,7 +11,7 @@ cover: cloud.webp - [:material-bug-outline: 被动攻击](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: 服务提供商](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. +Many **cloud storage providers** require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure end-to-end encryption. If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients. @@ -28,7 +28,9 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for ![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right } -**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. +**Proton Drive** is an encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail). + +The initial free storage is limited to 2 GB, but with the completion of [certain steps](https://proton.me/support/more-free-storage-existing-users), additional storage can be obtained up to 5 GB. [:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/drive/privacy-policy){ .card-link title="Privacy Policy" } @@ -47,9 +49,7 @@ Nextcloud is [still a recommended tool](document-collaboration.md#nextcloud) for
-The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source). - -Proton Drive's brand new mobile clients have not yet been publicly audited by a third party. +The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/community/open-source), but the brand new mobile clients have not yet been publicly audited by a third party. ## Tresorit @@ -84,7 +84,9 @@ Tresorit has received a number of independent security audits: - Computest discovered two vulnerabilities which have been resolved. - [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." + - Ernst & Young additionally tested the web, mobile, and desktop clients. They concluded: + + > Test results found no deviation from Tresorit’s data confidentiality claims. They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://efd.admin.ch/en/swiss-digital-initiative-en) which requires passing [35 criteria](https://swiss-digital-initiative.org/criteria) related to security, privacy, and reliability. @@ -130,7 +132,7 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November ### Minimum Requirements -- 使用端到端加密 +- Must enforce E2EE. - 必须提供免费计划或试用期进行测试。 - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 必须提供一个支持基本文件管理功能的网络界面。 @@ -141,10 +143,10 @@ Peergos was [audited](https://peergos.org/posts/security-audit-2024) in November Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Clients should be open source. -- 客户端应由独立的第三方对其进行全面的审计。 +- Clients should be audited in their entirety by an independent third party. - 应提供Linux、Android、Windows、macOS和iOS的本地客户端。 - 这些客户端应该与云存储供应商的本地操作系统工具集成,如iOS上的Files应用集成,或Android上的DocumentsProvider功能。 -- 应支持与其他用户轻松分享文件。 +- Should support easy file sharing with other users. - 应在网络界面上至少提供基本的文件预览和编辑功能。 [^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services. diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 7b450f8b..b5bf41df 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -34,7 +34,7 @@ cover: data-redaction.webp
Downloads -- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2) +- [:fontawesome-brands-windows: Windows](https://pypi.org/project/mat2#metadata-and-privacy) - [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew) - [:simple-linux: Linux](https://pypi.org/project/mat2) - [:octicons-globe-16: Web](https://0xacab.org/jvoisin/mat2#web-interface) @@ -51,10 +51,10 @@ cover: data-redaction.webp **ExifEraser**是一个现代的、无权限的图像元数据删除应用程序,适用于Android。 -它目前支持JPEG、PNG和WebP文件。 +It currently supports JPEG, PNG, and WebP files. -[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title="Documentation" } +[:octicons-repo-16: Repository](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#description){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md index 9f2b99f9..c384ca43 100644 --- a/i18n/zh/desktop-browsers.md +++ b/i18n/zh/desktop-browsers.md @@ -91,7 +91,7 @@ These are our currently recommended **desktop web browsers** and configurations Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). When adjusting the security level, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. Modifications other than adjusting this setting would make your fingerprint unique, defeating the purpose of using this browser. 如果你想对浏览器进行更多的配置而且不担心指纹识别,我们建议你使用 [Firefox](#firefox)。 diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index 09177cd6..28cac620 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -24,8 +24,8 @@ cover: desktop.webp **Fedora Linux** is our recommended desktop distribution for people new to Linux. Fedora generally adopts newer technologies (e.g., [Wayland](https://wayland.freedesktop.org) and [PipeWire](https://pipewire.org)) before other distributions. 这些新技术往往伴随着安全、隐私和总体可用性的改进。 [:octicons-home-16: Homepage](https://fedoraproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -46,8 +46,8 @@ Fedora有一个半滚动的发布周期。 While some packages like the desktop openSUSE Tumbleweed uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. [:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title="Contribute" }
@@ -64,8 +64,8 @@ Tumbleweed采用的是滚动发布模式,每次更新都是以快照的形式 **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution, meaning that you only get what you install. 更多信息见他们的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。 [:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title="Documentation" } +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title="Contribute" }
@@ -90,8 +90,8 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. [:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/emerging){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title="Contribute" }
@@ -116,8 +116,8 @@ As an alternative to Flatpaks, there is the option of [Toolbx](https://docs.fedo NixOS是一个基于Nix软件包管理器的独立发行版,注重可重复性和可靠性。 [:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title="Contribute" }
@@ -145,8 +145,8 @@ Nix is a source-based package manager; if there’s no pre-built available in th [:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title="Documentation" } +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title="Contribute" }
@@ -167,8 +167,8 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh **Tails**是一个基于Debian的实时操作系统,它通过Tor路由所有的通信,它可以从DVD、U盘或SD卡安装在几乎任何电脑上启动。 It uses [Tor](tor.md) to preserve privacy and [:material-incognito: Anonymity](basics/common-threats.md#anonymity-vs-privacy){ .pg-purple } while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. [:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title="Documentation" } +[:octicons-heart-16:](https://tails.net/donate){ .card-link title="Contribute" }
@@ -204,9 +204,9 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte [:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } -[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title="Contribute" }
@@ -247,9 +247,9 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou [:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title="Contribute" }
diff --git a/i18n/zh/dns.md b/i18n/zh/dns.md index a1b45e5e..8b1d2286 100644 --- a/i18n/zh/dns.md +++ b/i18n/zh/dns.md @@ -87,7 +87,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://controld.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://controld.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.controld.com/docs/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Control-D-Inc/ctrld){ .card-link title="Source Code" }
@@ -114,7 +114,7 @@ These DNS filtering solutions offer a web dashboard where you can customize the [:octicons-home-16: Homepage](https://nextdns.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextdns.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.nextdns.io){ .card-link title=Documentation} +[:octicons-info-16:](https://help.nextdns.io){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/nextdns/nextdns){ .card-link title="Source Code" }
@@ -151,7 +151,7 @@ NextDNS also offers a public DoH service at `https://dns.nextdns.io` and DNS-ove [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -174,10 +174,10 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot **DNSCrypt-Proxy** is a DNS proxy with support for [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DoH](advanced/dns-overview.md#dns-over-https-doh), and [Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). -[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy#readme){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title="Contribute" }
Downloads diff --git a/i18n/zh/document-collaboration.md b/i18n/zh/document-collaboration.md index 064b6a09..94ad1099 100644 --- a/i18n/zh/document-collaboration.md +++ b/i18n/zh/document-collaboration.md @@ -54,7 +54,7 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e ![CryptPad logo](assets/img/document-collaboration/cryptpad.svg){ align=right } -**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) +**CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:material-star-box: Read our latest CryptPad review.](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review) [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index 8947887b..24a9ed65 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -65,7 +65,7 @@ Cryptomator's documentation details its intended [security target](https://docs. **Picocrypt** is a small and simple encryption tool that provides modern encryption. Picocrypt使用安全的XChaCha20密码和Argon2id密钥推导功能来提供高水平的安全。 它使用Go的标准x/crypto模块来实现其加密功能。 -[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://github.com/Picocrypt/Picocrypt#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/Picocrypt/Picocrypt){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title="Contribute" } @@ -207,7 +207,7 @@ We advise against using your iCloud account for recovery; instead, you should se **LUKS** is the default FDE method for Linux. It can be used to encrypt full volumes, partitions, or create encrypted containers. -[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/cryptsetup/cryptsetup#what-the-){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" } diff --git a/i18n/zh/health-and-wellness.md b/i18n/zh/health-and-wellness.md index 4627072e..e6020bc4 100644 --- a/i18n/zh/health-and-wellness.md +++ b/i18n/zh/health-and-wellness.md @@ -1,8 +1,8 @@ --- -meta_title: Privacy Respecting Health and Wellness apps for Android and iOS - Privacy Guides -title: Health and Wellness Apps +meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides +title: Health and Wellness icon: material/heart-pulse -description: These applications are what we currently recommend for all health and fitness-related activites on your phone. +description: These applications are what we currently recommend for all health- and fitness-related activites on your phone. cover: health.webp --- @@ -99,7 +99,7 @@ These general purpose apps can do everything from counting steps and tracking sl
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge) +- [:simple-fdroid: F-Droid](https://f-droid.org/packages/nodomain.freeyourgadget.gadgetbridge)
diff --git a/i18n/zh/index.md b/i18n/zh/index.md index 69d66092..e3d7b273 100644 --- a/i18n/zh/index.md +++ b/i18n/zh/index.md @@ -114,6 +114,6 @@ In the modern age of digital data exploitation, your privacy has never been more Many people get the concepts of privacy, security, and anonymity confused. 例如,你会看到有人批评各种产品 "不私密",但他们的意思其实是这些产品不提供匿名性。 在本网站上,我们这三个主题都会介绍,但重要的是,你要了解它们之间的区别,以及每一个主题何时发挥作用。 -[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/){ class="md-button" } +[:material-movie-open-play-outline: Video: 5 Steps to Improve Your Privacy](https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online){ class="md-button" } diff --git a/i18n/zh/language-tools.md b/i18n/zh/language-tools.md index 6926a92e..bd13e674 100644 --- a/i18n/zh/language-tools.md +++ b/i18n/zh/language-tools.md @@ -10,7 +10,7 @@ cover: language-tools.webp - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal } - [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text to a server, and can be self-hosted and used offline for maximum control of your data. +Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data. ## LanguageTool @@ -23,7 +23,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s [:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title=Documentation} +[:octicons-info-16:](https://languagetooler.freshdesk.com/en/support/solutions){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/languagetool-org){ .card-link title="Source Code" }
@@ -33,7 +33,7 @@ Text inputted to grammar, spelling, and style checkers, as well as translation s - [:fontawesome-brands-windows: Windows](https://languagetool.org/windows-desktop) - [:simple-apple: macOS](https://languagetool.org/mac-desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/languagetool) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/grammar-and-spell-checker/oldceeleldhonbafppcapldpdifcinji) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oldceeleldhonbafppcapldpdifcinji) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/hfjadhjooeceemgojogkhlppanjkbobc) - [:simple-safari: Safari](https://apps.apple.com/app/id1534275760) diff --git a/i18n/zh/maps.md b/i18n/zh/maps.md index ce2ca61d..a92f5c52 100644 --- a/i18n/zh/maps.md +++ b/i18n/zh/maps.md @@ -20,7 +20,7 @@ The recommendations here either do not collect any user data or at least do not ![Organic Maps logo](assets/img/maps/organic-maps.svg){ align=right } -**Organic Maps** is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. +**Organic Maps** is an open-source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide, offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline. Features include cycling routes, hiking trails and walking paths, turn-by-turn navigation with voice guidance, and public transport route planning (only available in supported regions and cities). @@ -47,7 +47,7 @@ Please note that Organic Maps is a simple, basic app that lacks certain features ![OsmAnd logo](assets/img/maps/osmand.svg){ align=right } -**OsmAnd** is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data. +**OsmAnd** is an offline map and navigation application based on OpenStreetMap that offers turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open source and does not collect any user data. [:octicons-home-16: Homepage](https://osmand.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://osmand.net/docs/legal/privacy-policy){ .card-link title="Privacy Policy" } @@ -58,13 +58,15 @@ Please note that Organic Maps is a simple, basic app that lacks certain features - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.osmand) - [:simple-android: Android](https://osmand.net/docs/versions/free-versions) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257) +- [:simple-appstore: App Store](https://apps.apple.com/us/app/id934850257)
-Compared to Organic Maps, OsmAnd has more [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) but is also more complicated to use. One noteworthy feature is the ability to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://web.archive.org/web/20211203063453/http://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). +OsmAnd allows you to overlay or underlay external map data, such as satellite images from Microsoft or [traffic data](https://themm.net/public/osmand_traffic) from Google, although the latter is ignored by the automatic route planning. OsmAnd also has an optional integration of street view images provided by [Mapillary](https://mapillary.com). + +You can find a detailed overview of OsmAnd's supported [features](https://wiki.openstreetmap.org/wiki/OsmAnd#Features) on the OpenStreet Map Wiki. ## Criteria diff --git a/i18n/zh/meta/admonitions.md b/i18n/zh/meta/admonitions.md index e4641a0e..bef06a05 100644 --- a/i18n/zh/meta/admonitions.md +++ b/i18n/zh/meta/admonitions.md @@ -3,7 +3,7 @@ title: Admonitions description: A guide for website contributors on creating admonitions. --- -**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. +**Admonitions** (or "call-outs") are tools that writers can use to include side content in an article without interrupting the document flow.

Example Admonition

@@ -41,7 +41,7 @@ ENCLOSED TEXT
``` -The `TITLE` must be specified, if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. +The `TITLE` must be specified; if you don't want a specific title you can set it to the same text as the `TYPE` (see below) in title case, e.g. `Note`. The `ENCLOSED TEXT` should be Markdown formatted. ### Regular types @@ -166,11 +166,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -189,11 +189,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include end-to-end encryption, so it's best hosted on a server that you trust and is under your control. [:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -209,7 +209,7 @@ This format is used to generate recommendation cards. Notably it is missing the #### `downloads` -This is a special type of collapsible admonition, used to generate the download links section. It is only used within recommendation cards, as shown in the example above. +This is a special type of collapsible admonition which is used to generate sections containing download links. It is only used within recommendation cards, as shown in the example above. ```markdown title="Downloads Section"
@@ -217,7 +217,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -233,7 +233,7 @@ This is a special type of collapsible admonition, used to generate the download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) -- [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) +- [:simple-github: GitHub](https://github.com/ProtonMail/android-mail/releases) - [:fontawesome-brands-windows: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) - [:simple-linux: Linux](https://proton.me/mail/bridge#download) @@ -245,7 +245,7 @@ This is a special type of collapsible admonition, used to generate the download ## Old Format -Throughout the site, you may see some admonitions formatted similarly to these examples: +Throughout the site, you may see some admonitions formatted like the following examples: ```markdown title="Admonition" !!! note @@ -289,6 +289,6 @@ massa, nec semper lorem quam in massa. -**This format is no longer used going forward,** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer HTML-based format should be used. +**This format is no longer used going forward** because it is incompatible with newer versions of our translation software at Crowdin. When adding a new page to the site, only the newer, HTML-based format should be used. -There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer HTML-based format above over time as we continue to update the site. +There is no rush to convert admonitions with the old format to the new format. Pages currently using this formatting should continue to work, but we will be updating them to use the newer, HTML-based format above over time as we continue to update the site. diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index dd697f1f..f39d08be 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -243,7 +243,7 @@ These options can be found in :material-menu: → :gear: **Settings** → **Priv - [x] Select **Always use secure connections** -这可以防止你无意中以纯文本的HTTP方式连接到一个网站。 HTTP is extremely uncommon nowadays, so this should have little to no impact on your day-to-day browsing. +This prevents you from unintentionally connecting to a website in plain-text HTTP. HTTP is extremely uncommon nowadays, so this should have little to no impact on your day-to-day browsing. #### Adblock Plus settings @@ -304,7 +304,7 @@ This prevents Siri from using content from Safari for Siri suggestions. - [ ] Disable **Search Engine Suggestions** -This setting sends whatever you type in the address bar to the search engine set in Safari. 禁用搜索建议可以让你更精确地控制你向搜索引擎供应商发送的数据。 +This setting sends whatever you type in the address bar to the search engine set in Safari. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider. #### Profiles diff --git a/i18n/zh/news-aggregators.md b/i18n/zh/news-aggregators.md index 592fd769..5a19f82c 100644 --- a/i18n/zh/news-aggregators.md +++ b/i18n/zh/news-aggregators.md @@ -42,9 +42,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NewsFlash logo](assets/img/news-aggregators/newsflash.png){ align=right } -**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or used with services like [Nextcloud News](https://apps.nextcloud.com/apps/news) or [Inoreader](https://inoreader.com). It has a search feature and a pre-defined list of sources that you can add directly. +**NewsFlash** is an open-source, modern, and easy-to-use news feed reader for Linux. It can be used offline or with services like [Inoreader](https://inoreader.com) or [Nextcloud News](https://apps.nextcloud.com/apps/news). It has a search feature and a pre-defined list of sources that you can add directly. -[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk){ .md-button .md-button--primary } +[:octicons-repo-16: Repository](https://gitlab.com/news-flash/news_flash_gtk#newsflash){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/news-flash/news_flash_gtk){ .card-link title="Source Code" }
@@ -62,9 +62,11 @@ A **news aggregator** is software which aggregates digital content from online n ![Feeder logo](assets/img/news-aggregators/feeder.png){ align=right } -**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Feeder** is a modern RSS client for Android that has many [features](https://github.com/spacecowboy/Feeder#features) and works well with folders of RSS feeds. -[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder){ .md-button .md-button--primary } +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). + +[:octicons-repo-16: Repository](https://github.com/spacecowboy/Feeder#readme){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/spacecowboy/Feeder){ .card-link title="Source Code" } [:octicons-heart-16:](https://ko-fi.com/spacecowboy){ .card-link title="Contribute" } @@ -85,10 +87,12 @@ A **news aggregator** is software which aggregates digital content from online n ![Miniflux logo](assets/img/news-aggregators/miniflux.svg#only-light){ align=right } ![Miniflux logo](assets/img/news-aggregators/miniflux-dark.svg#only-dark){ align=right } -**Miniflux** is a web-based news aggregator that you can self-host. It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). +**Miniflux** is a web-based news aggregator that you can self-host. + +It supports [RSS](https://en.wikipedia.org/wiki/RSS), [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)), [RDF](https://en.wikipedia.org/wiki/RDF%2FXML), and [JSON Feed](https://en.wikipedia.org/wiki/JSON_Feed). [:octicons-home-16: Homepage](https://miniflux.app){ .md-button .md-button--primary } -[:octicons-info-16:](https://miniflux.app/docs/index){ .card-link title="Documentation" } +[:octicons-info-16:](https://miniflux.app/docs/index#user-guide){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } [:octicons-heart-16:](https://miniflux.app/#donations){ .card-link title="Contribute" } @@ -100,7 +104,9 @@ A **news aggregator** is software which aggregates digital content from online n ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } -**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. +**NetNewsWire** is a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. + +It supports conventional feed formats and includes built-in support for Reddit feeds. [:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" } @@ -126,7 +132,7 @@ A **news aggregator** is software which aggregates digital content from online n **Newsboat** is an RSS/Atom feed reader for the text console. It's an actively maintained fork of [Newsbeuter](https://en.wikipedia.org/wiki/Newsbeuter). It is very lightweight and ideal for use over [Secure Shell](https://en.wikipedia.org/wiki/Secure_Shell). [:octicons-home-16: Homepage](https://newsboat.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://newsboat.org/releases/2.37/docs/newsboat.html){ .card-link title="Documentation" } +[:octicons-info-16:](https://newsboat.org/releases/2.38/docs/newsboat.html){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" } @@ -164,7 +170,7 @@ You can subscribe to YouTube channels without logging in and associating usage i

Example

-To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** → **Share** → **Copy channel ID**. Replace `[CHANNEL ID]` below: +To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found in the expanded description (i.e., the "About" section) of the YouTube channel you wish to subscribe to: **About** → **Share channel** → **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index 844ebbfc..51787cbd 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -1,7 +1,7 @@ --- title: "Notebooks" icon: material/notebook-edit-outline -description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. +description: These encrypted note-taking apps let you keep track of your notes without giving them to a third party. cover: notebooks.webp --- @@ -11,7 +11,7 @@ cover: notebooks.webp Keep track of your notes and journals without giving them to a third party. -If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE. +If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports end-to-end encryption. ## Cloud-based @@ -21,13 +21,15 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Standard Notes logo](assets/img/notebooks/standard-notes.svg){ align=right } -**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). +**Standard Notes** is a simple and private notes app that features cross-platform sync for seamless use. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. + +Standard Notes has also undergone multiple [independent audits](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit). [:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://standardnotes.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } -[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title="Contribute" }
Downloads @@ -38,7 +40,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:fontawesome-brands-windows: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com) +- [:octicons-browser-16: Web](https://app.standardnotes.com)
@@ -52,13 +54,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). +**Notesnook** is a free (as in speech), open-source, and easy-to-use E2EE note-taking app focused on user privacy. + +It features sync functionality that allows you to access your notes on multiple platforms. You can easily import your notes from Evernote, OneNote, and other apps using their [official importer](https://importer.notesnook.com). [:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } +[:octicons-heart-16:](https://opencollective.com/notesnook){ .card-link title="Contribute" }
Downloads @@ -69,10 +73,10 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:fontawesome-brands-windows: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj) -- [:octicons-globe-16: Web](https://app.notesnook.com) - [:simple-flathub: Flathub](https://flathub.org/apps/com.notesnook.Notesnook) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/kljhpemdlcnjohmfmkogahelkcidieaj) +- [:octicons-browser-16: Web](https://app.notesnook.com)
@@ -84,13 +88,15 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for ![Joplin logo](assets/img/notebooks/joplin.svg){ align=right } -**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle numerous markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. +**Joplin** is a free, open-source, and fully-featured E2EE note-taking and to-do application which can handle numerous Markdown notes organized into notebooks and tags. + +It can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. [:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title="Contribute" }
Downloads @@ -102,13 +108,13 @@ Standard Notes has [joined Proton AG](https://standardnotes.com/blog/joining-for - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/alofnhikmmkdbbbgpnglcpdollgjjfek)
-Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. +Joplin [does not support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics app lock](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) for Android and iOS. ### Cryptee @@ -117,23 +123,25 @@ Joplin does not [support](https://github.com/laurent22/joplin/issues/289) passwo ![Cryptee logo](./assets/img/notebooks/cryptee.svg#only-light){ align=right } ![Cryptee logo](./assets/img/notebooks/cryptee-dark.svg#only-dark){ align=right } -**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. +**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. + +Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. [:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary } [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation} +[:octicons-info-16:](https://crypt.ee/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
Downloads -- [:octicons-globe-16: PWA](https://crypt.ee/download) +- [:octicons-browser-16: Web](https://crypt.ee/download)
-Cryptee offers 100 MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information. +Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform. ## Local notebooks @@ -143,12 +151,12 @@ Cryptee offers 100 MB of storage for free, with paid options if you need more. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. File synchronization is possible with tools like [Syncthing](file-sharing.md#syncthing-p2p). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} +[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title="Documentation" } [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" } -[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute } +[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title="Contribute" }
diff --git a/i18n/zh/office-suites.md b/i18n/zh/office-suites.md index e3da63b2..1c746ac7 100644 --- a/i18n/zh/office-suites.md +++ b/i18n/zh/office-suites.md @@ -48,9 +48,9 @@ Choose an **office suite** that does not require logging in to an account to acc **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. [:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } +:octicons-eye-16:{ .card-link title="Privacy Policy" } +:octicons-info-16:{ .card-link title=Documentation} +:octicons-code-16:{ .card-link title="Source Code" }
Downloads diff --git a/i18n/zh/os/windows/group-policies.md b/i18n/zh/os/windows/group-policies.md index 9032d760..6e221658 100644 --- a/i18n/zh/os/windows/group-policies.md +++ b/i18n/zh/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index 4661e99e..0d33514c 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -128,14 +128,14 @@ schema: **Password managers** allow you to securely store and manage passwords and other credentials with the use of a master password. -[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) +[Introduction to Passwords :material-arrow-right-drop-circle:](basics/passwords-overview.md)

信息

Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer end-to-end encryption at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -167,15 +167,15 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/bitwarden-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/bitwarden-free-password-m/nngceckbapebfimnlniiiahkandclblb) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/nngceckbapebfimnlniiiahkandclblb) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/jbkfoedolllekgbhcbcoahefnbanhhlh) -- [:simple-safari: Safari](https://apps.apple.com/us/app/bitwarden/id1352778147) +- [:simple-safari: Safari](https://apps.apple.com/app/id1352778147)
-Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault. +Bitwarden uses [PBKDF2](https://bitwarden.com/help/kdf-algorithms/#pbkdf2) as its key derivation function (KDF) algorithm by default. It also offers [Argon2](https://bitwarden.com/help/kdf-algorithms/#argon2id), which is more secure, as an alternative. You can change your account's KDF algorithm in the web vault: - [x] Select **Settings > Security > Keys > KDF algorithm > Argon2id** @@ -204,11 +204,11 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6443490629) - [:fontawesome-brands-windows: Windows](https://proton.me/pass/download) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) -- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:fontawesome-brands-edge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) +- [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/ghmbeldphafepmbegfdlkpapadhbakde) +- [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/gcllgfdnfnllodcaambdaknbipemelie) - [:octicons-browser-16: Web](https://pass.proton.me)
@@ -229,7 +229,9 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). + +1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } @@ -244,16 +246,16 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:fontawesome-brands-edge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) -- [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) +- [:simple-safari: Safari](https://apps.apple.com/app/id1569813296) - [:octicons-browser-16: Web](https://my.1password.com/signin)
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease-of-use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -276,7 +278,7 @@ Your 1Password vault is secured with both your master password and a randomized - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) - [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
@@ -330,9 +332,9 @@ These options allow you to manage an encrypted password database locally. - [:fontawesome-brands-windows: Windows](https://keepassxc.org/download/#windows) - [:simple-apple: macOS](https://keepassxc.org/download/#mac) - [:simple-linux: Linux](https://keepassxc.org/download/#linux) -- [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) +- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/oboonakemofpalcgghocfoadofidjkkk)
@@ -346,7 +348,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![KeePassDX logo](assets/img/password-management/keepassdx.svg){ align=right } -**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. +**KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms securely. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } @@ -363,6 +365,8 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se +The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. + ### Gopass (CLI)
diff --git a/i18n/zh/pastebins.md b/i18n/zh/pastebins.md index 8a823e62..fd9f64b9 100644 --- a/i18n/zh/pastebins.md +++ b/i18n/zh/pastebins.md @@ -17,11 +17,11 @@ cover: pastebins.webp ![PrivateBin logo](assets/img/pastebins/privatebin.svg){ align=right } -**PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. +**PrivateBin** is a minimalist, open-source, online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
@@ -49,11 +49,11 @@ cover: pastebins.webp ### Minimum Requirements - Must be open source. -- Must implement "zero-trust" end-to-end encryption. +- Must implement "zero-trust" E2EE. - Must support password-protected files. ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/zh/photo-management.md b/i18n/zh/photo-management.md index 6b8f2045..387e2551 100644 --- a/i18n/zh/photo-management.md +++ b/i18n/zh/photo-management.md @@ -1,7 +1,7 @@ --- title: Photo Management icon: material/image -description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access. +description: These photo management tools keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized parties. cover: photo-management.webp --- @@ -18,24 +18,26 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon ![Ente logo](assets/img/photo-management/ente.svg){ align=right } -**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year. +**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). + +The free plan offers 5 GB of storage as long as you use the service at least once a year. [:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://ente.io/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/ente-io/ente){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://ente.io/download) - [:simple-appstore: App Store](https://apps.apple.com/app/id1542026904) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases?q=photos) +- [:simple-android: Android](https://ente.io/download) - [:fontawesome-brands-windows: Windows](https://ente.io/download) - [:simple-apple: macOS](https://ente.io/download) - [:simple-linux: Linux](https://ente.io/download) -- [:octicons-globe-16: Web](https://web.ente.io) +- [:octicons-browser-16: Web](https://web.ente.io)
@@ -50,18 +52,19 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ![Stingle logo](assets/img/photo-management/stingle.png#only-light){ align=right } ![Stingle logo](assets/img/photo-management/stingle-dark.png#only-dark){ align=right } -**Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. +**Stingle** is a gallery and camera application with built-in, E2EE backup and sync functionality for your photos and videos. + +Storage starts at 1 GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. [:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-info-16:](https://stingle.org/faq){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) - [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle/stingle-photos-android/releases) @@ -97,7 +100,7 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Minimum Requirements -- Cloud-hosted providers must enforce end-to-end encryption. +- Cloud-hosted providers must enforce E2EE. - 必须提供免费计划或试用期进行测试。 - Must support TOTP or FIDO2 multifactor authentication, or passkey logins. - 必须提供一个支持基本文件管理功能的网络界面。 @@ -106,4 +109,4 @@ Ente Photos underwent an [audit by Cure53](https://ente.io/blog/cryptography-aud ### Best Case -- Should have a published audit from a reputable, independent third-party. +- Should have a published audit from a reputable, independent third party. diff --git a/i18n/zh/privacy.md b/i18n/zh/privacy.md index 3b2777e8..2a06d68b 100644 --- a/i18n/zh/privacy.md +++ b/i18n/zh/privacy.md @@ -174,7 +174,7 @@ Privacy Guides does not respond to the (now deprecated) [Do Not Track HTTP heade ## Where does Privacy Guides store data about me? -Most data is hosted by [Triplebit](https://www.triplebit.org/) web services in the United States. +Most data is hosted by [Triplebit](https://www.triplebit.org) web services in the United States. Some publicly accessible data may be hosted by Content Delivery Networks with servers in other jurisdictions. For example, your profile picture may be stored on multiple servers around the world in order to improve the performance for visitors to our website. @@ -287,18 +287,18 @@ Privacy Guides shares data about your posts and other activity as described in [ Privacy Guides uses the following subprocessors, and may share personal data with the service providers we use in order to host our website, deliver content, secure our services, store data, host and manage our open source website, and provide user support. -| Subprocessor | Service | Function | Processing | Links | -| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------- | -| [Bunny.net](https://bunny.net/) (Slovenia) | [Bunny CDN](https://bunny.net/cdn/) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy/), [GDPR Center](https://bunny.net/gdpr/) | -| [Cloudflare](https://www.cloudflare.com/) (USA) | [Authoritative DNS](https://www.cloudflare.com/application-services/products/dns/) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://www.cloudflare.com/privacypolicy/), [GDPR Center](https://www.cloudflare.com/trust-hub/gdpr/) | -| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | -| [GitHub](https://github.com/) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [GitHub](https://github.com/) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | -| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | -| [Triplebit](https://www.triplebit.org/) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | -| [Triplebit](https://www.triplebit.org/) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy/) | +| Subprocessor | Service | Function | Processing | Links | +| ----------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------- | ------------------------------------------------------------------------------------------------------------ | +| [Bunny.net](https://bunny.net) (Slovenia) | [Bunny CDN](https://bunny.net/cdn) | Content Delivery Network services for distributing images and other static assets. | Slovenia, Global | [Privacy Notice](https://bunny.net/privacy), [GDPR Center](https://bunny.net/gdpr) | +| [Cloudflare](https://cloudflare.com) (USA) | [Authoritative DNS](https://cloudflare.com/application-services/products/dns) | Authoritative DNS services for our domain names. | USA, Global | [Privacy Notice](https://cloudflare.com/privacypolicy), [GDPR Center](https://cloudflare.com/trust-hub/gdpr) | +| [Fediverse Communications LLC](https://fediverse.us) (USA) | PeerTube | For hosting public videos produced by Privacy Guides which are shared or embedded on this website. | USA | [More information](https://neat.tube/about/instance) | +| [GitHub](https://github.com) (USA) | Git Repositories | _For visitors to this website_: sharing information with our visitors about the current release, repo star count, etc. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | Git Repositories, Issues, Pull Requests | _For contributors to this website_: hosting our source code and communications platforms such as our issues tracker. | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [GitHub](https://github.com) (USA) | [Sponsors](https://github.com/sponsors/privacyguides) | For collecting payments for gifts to Privacy Guides | USA | [Privacy Notice](https://docs.github.com/en/site-policy/privacy-policies/github-general-privacy-statement) | +| [Stripe](https://stripe.com) (USA) | Connect | _For certain donations via GitHub Sponsors_: payment processing for donations | USA | [Privacy Notice](https://stripe.com/privacy), [GDPR Center](https://stripe.com/legal/privacy-center) | +| [Triplebit](https://www.triplebit.org) (USA) | Object Storage | For hosting static websites and static media content, and distributing static content | USA, Poland | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | [Umami Statistics](https://stats.triplebit.net/share/S80jBc50hxr5TquS/www.privacyguides.org) | For compiling aggregated statistics of our website visitor data based on server-side visitor info submissions | USA | [Privacy Notice](https://www.triplebit.org/privacy) | +| [Triplebit](https://www.triplebit.org) (USA) | Virtual Private Servers | For hosting our dynamic websites, storing and processing personal data. | USA | [Privacy Notice](https://www.triplebit.org/privacy) | ## Does Privacy Guides delete inactive accounts? diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 8a493040..55f8e3b3 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -15,7 +15,7 @@ cover: real-time-communication.webp These are our recommendations for encrypted **real-time communication**. These come in the form of many [types of communication networks](./advanced/communication-network-types.md). -[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/ ""){.md-button} +[:material-movie-open-play-outline: Video: It's time to stop using SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why ""){.md-button} ## 可加密的聊天软件 diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index a6782703..2a6bafa2 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -354,7 +354,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- ![Kobold logo](assets/img/ai-chat/kobold.png){ .twemoji loading=lazy } [Kobold.cpp](ai-chat.md#koboldcpp) -- ![Llamafile logo](assets/img/ai-chat/llamafile.png){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) +- ![Llamafile logo](assets/img/ai-chat/llamafile.webp){ .twemoji loading=lazy } [Llamafile](ai-chat.md#llamafile) - ![Ollama logo](assets/img/ai-chat/ollama.png){ .twemoji loading=lazy } [Ollama (CLI)](ai-chat.md#ollama-cli)
diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index f5ae70cb..40bc64f1 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -31,7 +31,7 @@ schema: **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 -[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/ ""){.md-button} +[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button.md-button--primary} [:material-movie-open-play-outline: Video: Why You Need Tor](https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor ""){.md-button}

Tip

@@ -42,7 +42,7 @@ Before connecting to Tor, please ensure you've read our [overview](advanced/tor- There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for [:material-incognito: anonymous](basics/common-threats.md#anonymity-vs-privacy ""){.pg-purple} browsing for desktop computers and Android. -Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. +Some of these apps are better than others; making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using mobile browser apps like [Onion Browser](#onion-browser-ios) to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile. If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. @@ -50,15 +50,15 @@ If more complete anonymity is paramount to your situation, you should **only** b
-! [Tor浏览器徽标] (assets/img/browsers/tor.svg) {align = right} +![Tor Browser logo](assets/img/browsers/tor.svg){ align=right } -* * Tor浏览器* *是您需要匿名时的选择,它为您提供了对Tor网络和网桥的访问权限,并且它包括默认安全的默认设置和扩展: *标准* , *更安全*和*最安全*。 +**Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. [:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title="Contribute" }
Downloads @@ -80,7 +80,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a
-Tor浏览器旨在防止指纹识别,或根据您的浏览器配置识别您。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. +Tor浏览器旨在防止指纹识别,或根据您的浏览器配置识别您。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). When modifying the security level setting, you **must** always restart the browser before continuing to use it. Otherwise, [the security settings may not be fully applied](https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw), putting you at a higher risk of fingerprinting and exploits than you may expect based on the setting chosen. In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -90,13 +90,15 @@ In addition to installing Tor Browser on your computer directly, there are also ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review/) +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). + +[:material-star-box: Read our latest Onion Browser review.](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation} +[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title="Contribute" }
Downloads diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index 14050078..fc119a5c 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -145,8 +145,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) -- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) - [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) +- [:simple-github: GitHub](https://github.com/ivpn/android-app/releases) - [:fontawesome-brands-windows: Windows](https://ivpn.net/apps-windows) - [:simple-apple: macOS](https://ivpn.net/apps-macos) - [:simple-linux: Linux](https://ivpn.net/apps-linux)