mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-18 08:44:22 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -1,21 +1,21 @@
|
|||||||
---
|
---
|
||||||
title: Private Payments
|
title: Private Zahlungsmethoden
|
||||||
icon: material/hand-coin
|
icon: material/hand-coin
|
||||||
---
|
---
|
||||||
|
|
||||||
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
|
Es gibt einen Grund, warum Daten über dein Kaufverhalten als der heilige Gral des Ad-Targeting gelten: Deine Einkäufe können einen wahren Schatz an Daten über dich preisgeben. Leider ist das derzeitige Finanzsystem von vornherein datenschutzfeindlich gestaltet und ermöglicht es Banken, Unternehmen und Regierungen, Transaktionen relativ einfach nachzuvollziehen. Dennoch hast du viele Möglichkeiten, wenn es darum geht, Zahlungen privat zu leisten.
|
||||||
|
|
||||||
## Cash
|
## Bargeld
|
||||||
|
|
||||||
For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable.
|
Seit Jahrhunderten ist **Bargeld** die wichtigste Form des privaten Zahlungsverkehrs. Bargeld hat in den meisten Fällen hervorragende Eigenschaften in Bezug auf den Schutz der Privatsphäre, wird in den meisten Ländern akzeptiert und ist **fungibel**, d. h. es ist nicht einmalig und vollständig austauschbar.
|
||||||
|
|
||||||
Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
|
Die Gesetze zur Barzahlung sind von Land zu Land unterschiedlich. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
|
||||||
|
|
||||||
Despite this, it’s typically the best option.
|
Despite this, it’s typically the best option.
|
||||||
|
|
||||||
## Prepaid Cards & Gift Cards
|
## Prepaid-Karten & Geschenkkarten
|
||||||
|
|
||||||
It’s relatively simple to purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually don’t have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout to reduce fraud.
|
Es ist relativ einfach, Geschenkkarten und Prepaid-Karten in den meisten Lebensmittelgeschäften und Verbrauchermärkten mit Bargeld zu kaufen. Geschenkkarten sind in der Regel gebührenfrei, bei Prepaid-Karten können Gebühren anfallen, daher solltest du auf mögliche Gebühren und das Ablaufdatum achten. Manche Geschäfte verlangen an der Kasse Ihren Ausweis, um Betrug zu vermeiden.
|
||||||
|
|
||||||
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (eg: from Visa or Mastercard) usually have limits of up to $1,000 per card.
|
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (eg: from Visa or Mastercard) usually have limits of up to $1,000 per card.
|
||||||
|
|
||||||
@ -25,7 +25,7 @@ Prepaid cards don’t allow cash withdrawals from ATMs or “peer-to-peer” pay
|
|||||||
|
|
||||||
Cash remains the best option for in-person purchases for most people. Gift cards can be useful for the savings they bring. Prepaid cards can be useful for places that don’t accept cash. Gift cards and prepaid cards are easier to use online than cash, and they are easier to acquire with cryptocurrencies than cash.
|
Cash remains the best option for in-person purchases for most people. Gift cards can be useful for the savings they bring. Prepaid cards can be useful for places that don’t accept cash. Gift cards and prepaid cards are easier to use online than cash, and they are easier to acquire with cryptocurrencies than cash.
|
||||||
|
|
||||||
### Online Marketplaces
|
### Online-Marktplätze
|
||||||
|
|
||||||
If you have [cryptocurrency](../cryptocurrency.md), you can purchase gift cards with an online gift card marketplace. Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits start at $5,000-10,000 a day for basic accounts, and significantly higher limits for ID verified accounts (if offered).
|
If you have [cryptocurrency](../cryptocurrency.md), you can purchase gift cards with an online gift card marketplace. Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits start at $5,000-10,000 a day for basic accounts, and significantly higher limits for ID verified accounts (if offered).
|
||||||
|
|
||||||
@ -33,7 +33,7 @@ When buying gift cards online, there is usually a slight discount. Prepaid cards
|
|||||||
|
|
||||||
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
|
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
|
||||||
|
|
||||||
## Virtual Cards
|
## Virtuelle Karten
|
||||||
|
|
||||||
Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information.
|
Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information.
|
||||||
|
|
||||||
@ -41,7 +41,7 @@ Another way to protect your information from merchants online is to use virtual,
|
|||||||
|
|
||||||
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
|
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
|
||||||
|
|
||||||
## Cryptocurrency
|
## Kryptowährung
|
||||||
|
|
||||||
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
|
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b
|
|||||||
|
|
||||||
Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance.
|
Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance.
|
||||||
|
|
||||||
### Other Coins (Bitcoin, Ethereum, etc.)
|
### Andere Coins (Bitcoin, Ethereum, etc.)
|
||||||
|
|
||||||
The vast majority of cryptocurrency projects use a public blockchain, meaning that all transactions are both easily traceable and permanent. As such, we strongly discourage the use of most cryptocurrency for privacy-related reasons.
|
The vast majority of cryptocurrency projects use a public blockchain, meaning that all transactions are both easily traceable and permanent. As such, we strongly discourage the use of most cryptocurrency for privacy-related reasons.
|
||||||
|
|
||||||
@ -70,17 +70,17 @@ Anonymous transactions on a public blockchain are *theoretically* possible, and
|
|||||||
|
|
||||||
==Your best option is to avoid these cryptocurrencies entirely and stick with one which provides privacy by default.== Attempting to use other cryptocurrency is outside the scope of this site and strongly discouraged.
|
==Your best option is to avoid these cryptocurrencies entirely and stick with one which provides privacy by default.== Attempting to use other cryptocurrency is outside the scope of this site and strongly discouraged.
|
||||||
|
|
||||||
### Wallet Custody
|
### Wallet-Verwahrung
|
||||||
|
|
||||||
With cryptocurrency there are two forms of wallets: custodial wallets and noncustodial wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Noncustodial wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, noncustodial wallets provide greater security and censorship-resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
|
With cryptocurrency there are two forms of wallets: custodial wallets and noncustodial wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Noncustodial wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, noncustodial wallets provide greater security and censorship-resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
|
||||||
|
|
||||||
### Acquisition
|
### Beschaffung
|
||||||
|
|
||||||
Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward.
|
Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward.
|
||||||
|
|
||||||
If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall.
|
If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall.
|
||||||
|
|
||||||
## Additional Considerations
|
## Zusätzliche Überlegungen
|
||||||
|
|
||||||
When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself.
|
When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself.
|
||||||
|
|
||||||
|
@ -5,58 +5,58 @@ icon: 'material/shield-account'
|
|||||||
|
|
||||||
Nie war deine Privatsphäre so wichtig, wie im modernen Zeitalter der digitalen Datenauswertung. Dennoch glaubne viele, dass es bereits ein hoffnungsloser Fall ist. Das ist es nicht. ==Deine Privatsphäre ist in Gefahr== und du musst dich darum kümmern. Bei der Privatsphäre geht es um Macht, darum ist es wichtig, dass die Macht in den richtigen Händen landet.
|
Nie war deine Privatsphäre so wichtig, wie im modernen Zeitalter der digitalen Datenauswertung. Dennoch glaubne viele, dass es bereits ein hoffnungsloser Fall ist. Das ist es nicht. ==Deine Privatsphäre ist in Gefahr== und du musst dich darum kümmern. Bei der Privatsphäre geht es um Macht, darum ist es wichtig, dass die Macht in den richtigen Händen landet.
|
||||||
|
|
||||||
Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters.
|
Bei der Privatsphäre geht es letztlich um Informationen über Menschen, und das ist deshalb so wichtig, weil wir wissen diese Informationen Macht über Menschen verleiht. Wenn uns daran gelegen ist, dass wir authentische, erfüllte und freie Menschen sein können, müssen wir uns um die Regeln kümmern und sorgen, die für Informationen über uns gelten. Unsere moderne Gesellschaft ist zu einem großen Teil auf **Informationen** ausgerichtet. Wenn du online einkaufst, die Nachrichten liest, etwas im Internet recherchierst, wählst, eine Wegbeschreibung suchst oder wirklich nur irgendetwas online tust, verlässt du dich auf diese Informationen. Wenn wir in einer Informationsgesellschaft leben, sind unsere eigenen Informationen wichtig, und deshalb ist auch die Privatsphäre wichtig.
|
||||||
|
|
||||||
## What is Privacy?
|
## Was ist Privatsphäre?
|
||||||
|
|
||||||
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
Viele Menschen verwechseln die Begriffe zur **Privatsphäre**, **Sicherheit** und **Anonymität**. Es gibt Leute, die verschiedene Produkte als "nicht privat" kritisieren, obwohl sie in Wirklichkeit meinen, dass sie beispielsweise keine Anonymität bieten. Auf dieser Website befassen wir uns mit allen drei Themen, aber es ist wichtig, dass du den Unterschied zwischen ihnen verstehst und weißt, wann es um welches der drei Themen geht.
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
<!-- markdownlint-disable-next-line -->
|
||||||
**Datenschutz**
|
**Datenschutz**
|
||||||
:
|
:
|
||||||
|
|
||||||
==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
|
==Privatsphäre ist die Gewissheit, dass deine Daten nur von den Parteien gesehen werden, die sie sehen sollen.== Im Zusammenhang mit einem Messengerdienst beispielsweise, sorgt die Ende-zu-Ende-Verschlüsselung (E2EE) für Privatsphäre, indem sie dafür sorgt, dass deine Nachricht nur für dich selbst und den Empfänger sichtbar ist.
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
<!-- markdownlint-disable-next-line -->
|
||||||
**Sicherheit**
|
**Sicherheit**
|
||||||
:
|
:
|
||||||
|
|
||||||
Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
|
Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. Im Zusammenhang mit dem Surfen im Internet kann solche Sicherheit zum Beispiel durch HTTPS-Zertifikate gewährleistet werden.
|
||||||
:
|
:
|
||||||
|
|
||||||
Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
|
Zertifikate beweisen, dass du direkt mit der von dir besuchten Website kommunizierst, und hindern Angreifer in deinem Netzwerk daran, die an die Website gesendeten oder von ihr stammenden Daten zu lesen oder zu verändern.
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
<!-- markdownlint-disable-next-line -->
|
||||||
**Anonymity**
|
**Anonymität**
|
||||||
:
|
:
|
||||||
|
|
||||||
Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
|
Anonymität ist die Fähigkeit, ohne dauerhafte Kennungen zu agieren. Dies könntest du online mit [Tor](../tor.md) erreichen, das es dir ermöglicht, mit einer zufälligen IP-Adresse und Netzwerkverbindung anstelle deiner eigenen im Internet zu surfen.
|
||||||
:
|
:
|
||||||
|
|
||||||
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
|
**Pseudonymität** ist ein ähnliches Konzept, das es dir ermöglicht, eine dauerhafte Kennung zu haben, ohne dass diese mit deiner tatsächlichen Identität verbunden ist. Wenn dich jeder online als `@GamerGuy12` kennt, aber niemand deinen richtigen Namen weiß, ist das dein Pseudonym.
|
||||||
|
|
||||||
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
|
Alle diese Konzepte überschneiden sich, aber es ist möglich, jede beliebige Kombination von ihnen zu haben. Für die meisten Menschen ist es am besten, wenn sich alle drei Konzepte überschneiden. Es ist jedoch schwieriger zu erreichen, als viele zunächst glauben. Manchmal muss man bei einigen dieser Punkte Kompromisse eingehen, und das ist auch in Ordnung. Hier kommt die **Bedrohungsmodellierung** ins Spiel, die es dir ermöglicht, fundierte Entscheidungen über die von dir genutzte [Software und Dienste](../tools.md) zu treffen.
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
|
[:material-book-outline: Mehr über die Bedrohungsanalyse erfahren](threat-modeling.md ""){.md-button}
|
||||||
|
|
||||||
## Privacy vs. Secrecy
|
## Privatsphäre (Datenschutz) vs. Geheimhaltung
|
||||||
|
|
||||||
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
|
Ein häufiges Gegenargument zum Datenschutz, ist die Vorstellung, dass man keine Privatsphäre braucht, wenn man **"nichts zu verbergen" hat.** Dies ist ein gefährlicher Irrtum, denn er erweckt den Eindruck, dass Menschen, die Privatsphäre fordern, abartig, kriminell oder falsch sein müssen.
|
||||||
|
|
||||||
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
|
==Man sollte Privatsphäre nicht mit Geheimhaltung verwechseln.== Wir wissen, was auf der Toilette passiert, aber du machst trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, nicht Geheimhaltung. Es gibt immer bestimmte Fakten über uns - z. B. Informationen über unsere Gesundheit oder unser Sexualverhalten -, von denen wir nicht möchten, dass die ganze Welt sie erfährt, und das ist in Ordnung so. Das Bedürfnis nach Privatsphäre ist legitim, und das macht uns menschlich. Bei der Privatsphäre geht es darum, deine Rechte über deine eigenen Daten zu stärken, nicht darum, Geheimnisse zu verbergen.
|
||||||
|
|
||||||
## Is Privacy About Control?
|
## Geht es bei Privatsphäre um Kontrolle?
|
||||||
|
|
||||||
A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work.
|
Eine gängige Definition des Begriffs "Datenschutz" besagt, dass es sich um die Möglichkeit handelt, zu *kontrollieren,* wer Zugang zu deinen Daten hat. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. Es klingt schön und es spricht viele Leute an, aber in der Praxis funktioniert es einfach nicht.
|
||||||
|
|
||||||
Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place.
|
Nimm zum Beispiel Einwilligungserklärungen für Cookies. Auf den verschiedenen Websites, die Sie besuchen, begegnen dir diese vielleicht dutzende Male pro Tag, mit einer netten Auswahl an Kontrollkästchen und Schiebereglern, die es dir ermöglichen, deine Präferenzen genau nach deinen Bedürfnissen zu "kuratieren". Am Ende drücken wir einfach auf die Schaltfläche "Ich stimme zu", weil wir den Artikel lesen oder einen Kauf tätigen wollen. Niemand möchte auf jeder einzelnen Website, die er besucht, ein persönliches Datenschutzaudit durchführen. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place.
|
||||||
|
|
||||||
==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to.
|
==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to.
|
||||||
|
|
||||||
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
Datenschutz ist etwas, das standardmäßig in die von uns genutzte [Software und die von uns genutzten Dienste](../tools.md) implementiert sein muss, denn man kann die meisten Anwendungen und Dienste nicht selbst auf Datenschutz trimmen.
|
||||||
|
|
||||||
## Sources
|
## Quellen
|
||||||
|
|
||||||
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards
|
- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) von Neil Richards
|
||||||
- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why)
|
- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why)
|
||||||
- [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452)
|
- [@Thorin-Oakenpants über Anonymität vs. Privatsphäre vs. Sicherheit](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452)
|
||||||
|
@ -239,9 +239,9 @@ Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anf
|
|||||||
<summary>Downloads</summary>
|
<summary>Downloads</summary>
|
||||||
|
|
||||||
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
||||||
- [:simple-windows11: Windows](https://brave.com/download)
|
- [:simple-windows11: Windows](https://brave.com/de/download/)
|
||||||
- [:simple-apple: macOS](https://brave.com/download)
|
- [:simple-apple: macOS](https://brave.com/de/download/)
|
||||||
- [:simple-linux: Linux](https://brave.com/linux)
|
- [:simple-linux: Linux](https://brave.com/linux/)
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/com.brave.Browser)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/com.brave.Browser)
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
@ -63,12 +63,12 @@ Nuestros proveedores recomendados usan encriptación, aceptan Monero, soportan W
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
#### :material-check:{ .pg-green } 91 Countries
|
#### :material-check:{ .pg-green } 91 Países
|
||||||
|
|
||||||
Proton VPN has [servers in 91 countries](https://protonvpn.com/vpn-servers) [or 8 if you use their free plan](https://protonvpn.com/free-vpn).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
Proton VPN tiene [servidores en 91 países](https://protonvpn.com/vpn-servers) [u 8 su usas el plan gratuito](https://protonvpn.com/free-vpn).(1) Eligiendo un proveedor de VPN con un servidor cerca tuyo reduce la latencia del tráfico de red saliente. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
||||||
{ .annotate }
|
{ .annotate }
|
||||||
|
|
||||||
1. Last checked: 2024-04-02
|
1. Última revisión: 2024-04-02
|
||||||
|
|
||||||
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||||
|
|
||||||
@ -92,9 +92,9 @@ Mullvad soporta el protocolo WireGuard®. [WireGuard](https://wireguard.com) es
|
|||||||
|
|
||||||
Proton VPN [recomienda](https://protonvpn.com/blog/wireguard) el uso de WireGuard con su servicio. En las aplicaciones de Proton VPN para Windows, macOS, iOS, Android, ChromeOS y Android TV, WireGuard es el protocolo predeterminado; sin embargo, [la compatibilidad](https://protonvpn.com/support/how-to-change-vpn-protocols) para el protocolo no está presente en su aplicación para Linux.
|
Proton VPN [recomienda](https://protonvpn.com/blog/wireguard) el uso de WireGuard con su servicio. En las aplicaciones de Proton VPN para Windows, macOS, iOS, Android, ChromeOS y Android TV, WireGuard es el protocolo predeterminado; sin embargo, [la compatibilidad](https://protonvpn.com/support/how-to-change-vpn-protocols) para el protocolo no está presente en su aplicación para Linux.
|
||||||
|
|
||||||
#### :material-alert-outline:{ .pg-orange } No IPv6 Support
|
#### :material-alert-outline:{ .pg-orange } Sin soporte para IPv6
|
||||||
|
|
||||||
Proton VPN's servers are only compatible with IPv4. The Proton VPN applications will block all outgoing IPv6 traffic, so you don't have to worry about your IPv6 address being leaked, but you will not be able to connect to any IPv6-only sites, and you will not be able to connect to Proton VPN from an IPv6-only network.
|
Los servidores de Proton VPN sólo son compatibles con IPv4. Las aplicaciones de Proton VPN bloquearán todo el tráfico IPv6 saliente, por lo que no debes preocuparte por la filtración de tu dirección IPv6, pero no serás capaz de conectarte a cualquier página disponible sólo a través de IPv6 y no serás capaz de conectarte a Proton VPN desde una red de solo IPv6.
|
||||||
|
|
||||||
#### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos
|
#### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos
|
||||||
|
|
||||||
@ -150,7 +150,7 @@ Los fallos del sistema [pueden ocurrir](https://protonvpn.com/support/macos-t2-c
|
|||||||
IVPN tiene [servidores en 37 países](https://ivpn.net/status).(1) Elegir un proveedor VPN con un servidor más cercano a ti reducirá la latencia del tráfico de red que envíes. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
IVPN tiene [servidores en 37 países](https://ivpn.net/status).(1) Elegir un proveedor VPN con un servidor más cercano a ti reducirá la latencia del tráfico de red que envíes. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
||||||
{ .annotate }
|
{ .annotate }
|
||||||
|
|
||||||
1. Last checked: 2024-04-02
|
1. Última revisión: 2024-04-02
|
||||||
|
|
||||||
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||||
|
|
||||||
@ -225,7 +225,7 @@ Proton VPN tiene sus propios servidores y centros de datos en Suiza, Islandia y
|
|||||||
Mullvad tiene [servidores en 41 países](https://mullvad.net/servers).(1) Elegir un proveedor de VPN con el servidor más cercano a ti reducirá la latencia del tráfico de red que envías. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
Mullvad tiene [servidores en 41 países](https://mullvad.net/servers).(1) Elegir un proveedor de VPN con el servidor más cercano a ti reducirá la latencia del tráfico de red que envías. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino.
|
||||||
{ .annotate }
|
{ .annotate }
|
||||||
|
|
||||||
1. Last checked: 2024-04-02
|
1. Última revisión: 2024-04-02
|
||||||
|
|
||||||
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
También pensamos que es mejor para la seguridad de las claves privadas del proveedor de VPN si utilizan [servidores dedicados](https://en.wikipedia.org/wiki/Dedicated_hosting_service), en lugar de soluciones compartidas más baratas (con otros clientes) como los [[servidores privados virtuales](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user