mirror of
https://github.com/privacyguides/i18n.git
synced 2025-09-01 10:58:46 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -1,11 +1,11 @@
|
||||
---
|
||||
title: Traffic Statistics
|
||||
title: トラフィック統計情報
|
||||
---
|
||||
|
||||
## Website Statistics
|
||||
## ウェブサイトの統計情報
|
||||
|
||||
<iframe plausible-embed src="https://stats.privacyguides.net/share/privacyguides.org?auth=IxTl2wRhi3uxF09rd1NSn&embed=true&theme=system&background=transparent" scrolling="no" frameborder="0" loading="lazy" style="width: 1px; min-width: 100%; height: 1600px;" id="plausibleFrame"></iframe>
|
||||
<div style="font-size: 14px; padding-bottom: 14px;">Stats powered by <a target="_blank" style="color: #4F46E5; text-decoration: underline;" href="https://plausible.io">Plausible Analytics</a></div>
|
||||
<div style="font-size: 14px; padding-bottom: 14px;"><a target="_blank" style="color: #4F46E5; text-decoration: underline;" href="https://plausible.io">Plausible Analytics</a> による統計</div>
|
||||
<script async src="https://stats.privacyguides.net/js/embed.host.js"></script>
|
||||
|
||||
<script>
|
||||
@@ -31,10 +31,10 @@ title: Traffic Statistics
|
||||
})
|
||||
</script>
|
||||
|
||||
## Blog Statistics
|
||||
## ブログの統計情報
|
||||
|
||||
<iframe plausible-embed src="https://stats.privacyguides.net/share/blog.privacyguides.org?auth=onWV76WWcsDifUqlaHEAg&embed=true&theme=system&background=transparent" scrolling="no" frameborder="0" loading="lazy" style="width: 1px; min-width: 100%; height: 1600px;" id="blogFrame"></iframe>
|
||||
<div style="font-size: 14px; padding-bottom: 14px;">Stats powered by <a target="_blank" style="color: #4F46E5; text-decoration: underline;" href="https://plausible.io">Plausible Analytics</a></div>
|
||||
<div style="font-size: 14px; padding-bottom: 14px;"><a target="_blank" style="color: #4F46E5; text-decoration: underline;" href="https://plausible.io">Plausible Analytics</a> による統計</div>
|
||||
<script async src="https://stats.privacyguides.net/js/embed.host.js"></script>
|
||||
|
||||
<script>
|
||||
|
@@ -6,7 +6,7 @@ description: An overview of several network architectures commonly used by insta
|
||||
|
||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
||||
|
||||
[おすすめのインスタントメッセンジャ](../real-time-communication.md ""){.md-button}
|
||||
[おすすめのインスタントメッセンジャー](../real-time-communication.md ""){.md-button}
|
||||
|
||||
## Centralized Networks
|
||||
|
||||
|
@@ -1,14 +1,14 @@
|
||||
---
|
||||
title: "Account Deletion"
|
||||
title: "アカウントの削除"
|
||||
icon: 'material/account-remove'
|
||||
description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection.
|
||||
---
|
||||
|
||||
Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
|
||||
Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. データ漏洩とは、サービスのセキュリティが侵害され、保護されている情報が不正行為者によって閲覧、送信、または盗まれることをいいます。 Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
|
||||
|
||||
## Finding Old Accounts
|
||||
## 古いアカウントを探す
|
||||
|
||||
### Password Manager
|
||||
### パスワードマネージャー
|
||||
|
||||
If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/).
|
||||
|
||||
@@ -20,18 +20,18 @@ Even if you haven't explicitly used a password manager before, there's a chance
|
||||
|
||||
Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about:
|
||||
|
||||
- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0)
|
||||
- macOS [Passwords](https://support.apple.com/en-us/HT211145)
|
||||
- iOS [Passwords](https://support.apple.com/en-us/HT211146)
|
||||
- Windows [資格情報マネージャー](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0)
|
||||
- macOS [パスワード](https://support.apple.com/en-us/HT211145)
|
||||
- iOS [パスワード](https://support.apple.com/en-us/HT211146)
|
||||
- Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
|
||||
|
||||
### メール
|
||||
|
||||
If you didn't use a password manager in the past or you think you have accounts that were never added to your password manager, another option is to search the email account(s) that you believe you signed up on. On your email client, search for keywords such as "verify" or "welcome." Almost every time you make an online account, the service will send a verification link or an introductory message to your email. This can be a good way to find old, forgotten accounts.
|
||||
|
||||
## Deleting Old Accounts
|
||||
## 古いアカウントを削除
|
||||
|
||||
### Log In
|
||||
### ログイン
|
||||
|
||||
In order to delete your old accounts, you'll need to first make sure you can log in to them. Again, if the account was in your password manager, this step is easy. If not, you can try to guess your password. Failing that, there are typically options to regain access to your account, commonly available through a "forgot password" link on the login page. It may also be possible that accounts you've abandoned have already been deleted—sometimes services prune all old accounts.
|
||||
|
||||
@@ -41,13 +41,13 @@ When attempting to regain access, if the site returns an error message saying th
|
||||
|
||||
Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation.
|
||||
|
||||
### Overwriting Account information
|
||||
### アカウント情報を上書きする
|
||||
|
||||
In some situations where you plan to abandon an account, it may make sense to overwrite the account information with fake data. Once you've made sure you can log in, change all the information in your account to falsified information. The reason for this is that many sites will retain information you previously had even after account deletion. The hope is that they will overwrite the previous information with the newest data you entered. However, there is no guarantee that there won't be backups with the prior information.
|
||||
|
||||
For the account email, either create a new alternate email account via your provider of choice or create an alias using an [email aliasing service](../email.md#email-aliasing-services). You can then delete your alternate email address once you are done. We recommend against using temporary email providers, as oftentimes it is possible to reactivate temporary emails.
|
||||
|
||||
### Delete
|
||||
### 削除
|
||||
|
||||
You can check [JustDeleteMe](https://justdeleteme.xyz) for instructions on deleting the account for a specific service. Some sites will graciously have a "Delete Account" option, while others will go as far as to force you to speak with a support agent. The deletion process can vary from site to site, with account deletion being impossible on some.
|
||||
|
||||
@@ -57,6 +57,6 @@ If you're satisfied that all information you care about is removed, you can safe
|
||||
|
||||
Even when you are able to delete an account, there is no guarantee that all your information will be removed. In fact, some companies are required by law to keep certain information, particularly when related to financial transactions. It's mostly out of your control what happens to your data when it comes to websites and cloud services.
|
||||
|
||||
## Avoid New Accounts
|
||||
## 新しいアカウントを避ける
|
||||
|
||||
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!
|
||||
|
@@ -219,7 +219,7 @@ Arkenfoxは、キャンバスのランダム化やFirefoxの組み込みのフ
|
||||
|
||||
1. We advise against using the Flatpak version of Brave, as it replaces Chromium's sandbox with Flatpak's, which is less effective. Additionally, the package is not maintained by Brave Software, Inc.
|
||||
|
||||
### Recommended Configuration
|
||||
### 推奨する設定
|
||||
|
||||
These options can be found in :material-menu: → **Settings**.
|
||||
|
||||
|
@@ -37,7 +37,7 @@ Our recommendation list contains email clients that support both [OpenPGP](encry
|
||||
- [:simple-linux: Linux](https://www.thunderbird.net)
|
||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
|
||||
|
||||
#### Recommended Configuration
|
||||
#### 推奨する設定
|
||||
|
||||
We recommend changing some of these settings to make Thunderbird a little more private.
|
||||
|
||||
|
@@ -8,12 +8,12 @@ cover: email.png
|
||||
|
||||
実質的に、電子メールはどんなオンラインサービスを使うにも必要ですが、個人間での会話にはお勧めしません。 他人との連絡には電子メールを使うよりも、前方秘匿性のあるインスタントメッセンジャの使用を検討してください。
|
||||
|
||||
[おすすめのインスタントメッセンジャ](real-time-communication.md ""){.md-button}
|
||||
[おすすめのインスタントメッセンジャー](real-time-communication.md ""){.md-button}
|
||||
|
||||
それ以外のことについては、持続可能なビジネスモデル、組み込まれたセキュリティとプライバシー機能に基づいて様々な電子メールプロバイダをお勧めします。
|
||||
それ以外のことについては、持続可能なビジネスモデル、組み込まれたセキュリティーとプライバシー機能に基づいて様々な電子メールプロバイダをお勧めします。
|
||||
|
||||
- [OpenPGP対応電子メールプロバイダ :material-arrow-right-drop-circle:](#openpgp-compatible-services)
|
||||
- [その他の暗号化プロバイダ :material-arrow-right-drop-circle:](#more-providers)
|
||||
- [OpenPGP対応の電子メールプロバイダー :material-arrow-right-drop-circle:](#openpgp-compatible-services)
|
||||
- [その他の暗号化プロバイダー :material-arrow-right-drop-circle:](#more-providers)
|
||||
- [メールエイリアスのサービス :material-arrow-right-drop-circle:](#email-aliasing-services)
|
||||
- [セルフホストのオプション :material-arrow-right-drop-circle:](#self-hosting-email)
|
||||
|
||||
@@ -248,7 +248,7 @@ Tutanota only directly accepts credit cards and PayPal, however [cryptocurrency]
|
||||
|
||||
#### :material-check:{ .pg-green } アカウントのセキュリティ
|
||||
|
||||
Tutanota supports [two factor authentication](https://tutanota.com/faq#2fa) with either TOTP or U2F.
|
||||
Tutanotaは[TOTPまたはU2Fによる二要素認証](https://tutanota.com/faq#2fa)をサポートしています。
|
||||
|
||||
#### :material-check:{ .pg-green } データのセキュリティ
|
||||
|
||||
|
@@ -1,6 +1,6 @@
|
||||
---
|
||||
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
|
||||
title: "Mobile Browsers"
|
||||
title: "モバイルブラウザー"
|
||||
icon: material/cellphone-information
|
||||
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
||||
cover: mobile-browsers.png
|
||||
@@ -64,9 +64,9 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
|
||||
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
||||
|
||||
#### Recommended Configuration
|
||||
#### 推奨する設定
|
||||
|
||||
Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another.
|
||||
本当に匿名でインターネットを閲覧する唯一の方法は、Tor Browserを使うことです。 Braveを使用する際は、特定の相手からプライバシーを保護するために以下の設定を変更することをお勧めしますが、 [Tor Browser](tor.md#tor-browser) 以外のブラウザーについては、*誰か*が何らかの形で追跡することができます。
|
||||
|
||||
These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**
|
||||
|
||||
@@ -138,7 +138,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple.
|
||||
[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
|
||||
|
||||
#### Recommended Configuration
|
||||
#### 推奨する設定
|
||||
|
||||
These options can be found in :gear: **Settings** → **Safari** → **Privacy and Security**.
|
||||
|
||||
|
@@ -26,7 +26,7 @@ Apple has historically had problems with properly anonymizing their telemetry on
|
||||
|
||||
More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. Apple has not fixed [these problems](https://gizmodo.com/clarence-thomas-aide-venmo-laywers-supreme-court-1850631585) as of July 2023.
|
||||
|
||||
## Recommended Configuration
|
||||
## 推奨する設定
|
||||
|
||||
### iCloud
|
||||
|
||||
|
@@ -17,7 +17,7 @@ schema:
|
||||
image: /assets/img/password-management/bitwarden.svg
|
||||
url: https://bitwarden.com
|
||||
sameAs: https://ja.wikipedia.org/wiki/Bitwarden
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem:
|
||||
- Windows
|
||||
- macOS
|
||||
@@ -35,7 +35,7 @@ schema:
|
||||
image: /assets/img/password-management/1password.svg
|
||||
url: https://1password.com
|
||||
sameAs: https://en.wikipedia.org/wiki/1Password
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem:
|
||||
- Windows
|
||||
- macOS
|
||||
@@ -52,7 +52,7 @@ schema:
|
||||
name: Psono
|
||||
image: /assets/img/password-management/psono.svg
|
||||
url: https://psono.com
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem:
|
||||
- Android
|
||||
- iOS
|
||||
@@ -67,7 +67,7 @@ schema:
|
||||
image: /assets/img/password-management/keepassxc.svg
|
||||
url: https://keepassxc.org/
|
||||
sameAs: https://en.wikipedia.org/wiki/KeePassXC
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem:
|
||||
- Windows
|
||||
- macOS
|
||||
@@ -82,7 +82,7 @@ schema:
|
||||
name: KeePassDX
|
||||
image: /assets/img/password-management/keepassdx.svg
|
||||
url: https://www.keepassdx.com/
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem: Android
|
||||
subjectOf:
|
||||
"@context": http://schema.org
|
||||
@@ -94,7 +94,7 @@ schema:
|
||||
name: Strongbox
|
||||
image: /assets/img/password-management/strongbox.svg
|
||||
url: https://strongboxsafe.com/
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem: iOS
|
||||
subjectOf:
|
||||
"@context": http://schema.org
|
||||
@@ -106,7 +106,7 @@ schema:
|
||||
name: gopass
|
||||
image: /assets/img/password-management/gopass.svg
|
||||
url: https://www.gopass.pw/
|
||||
applicationCategory: Password Manager
|
||||
applicationCategory: パスワードマネージャー
|
||||
operatingSystem:
|
||||
- Windows
|
||||
- macOS
|
||||
|
@@ -39,7 +39,7 @@ Tor works by routing your internet traffic through those volunteer-operated serv
|
||||
|
||||
## Torへの接続
|
||||
|
||||
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for anonymous browsing for desktop computers and Android. In addition to the apps listed below, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser.
|
||||
デバイスからTorネットワークに接続する様々な方法がありますが、 デスクトップコンピューターやAndroid用の匿名ブラウジング用に設計された、Firefoxのフォークの**Tor Browser**が最も一般的に使用されています。 In addition to the apps listed below, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser.
|
||||
|
||||
### Tor Browser
|
||||
|
||||
@@ -63,11 +63,11 @@ There are a variety of ways to connect to the Tor network from your device, the
|
||||
- [:simple-apple: macOS](https://www.torproject.org/download/)
|
||||
- [:simple-linux: Linux](https://www.torproject.org/download/)
|
||||
|
||||
!!! danger
|
||||
!!! 警告
|
||||
|
||||
Firefoxでおすすめされているものを含め、Tor Browserに追加の拡張機能をインストールしたり、「about:config」の設定を変更したりは、**絶対に**しないでください。 ブラウザ拡張機能や非標準の設定により、Torネットワーク上の他のユーザとあなたが区別されやすくなり、[フィンガープリント](https://support.torproject.org/glossary/browser-fingerprinting)されやすくなります。
|
||||
|
||||
Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/).
|
||||
Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 したがって、デフォルトの[セキュリティーレベル](https://tb-manual.torproject.org/security-settings/)を調整する以外の変更は、**決して**行うべきではありません。
|
||||
|
||||
### Orbot
|
||||
|
||||
@@ -83,7 +83,7 @@ Tor Browserはフィンガープリントを防止するよう設計されてお
|
||||
[:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute }
|
||||
|
||||
??? downloads
|
||||
??? ダウンロード
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599)
|
||||
@@ -119,10 +119,10 @@ We previously recommended enabling the *Isolate Destination Address* preference
|
||||
|
||||
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface.
|
||||
|
||||
[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button}
|
||||
[ブラウザでSnowflakeを実行 :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button}
|
||||
|
||||
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
|
||||
Snowflakeはあなたのプライバシーを高めるものではなく、また、あなたのブラウザーでTorネットワークに接続するために使用されるものでもありません。 However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
|
||||
|
||||
Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy.
|
||||
Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. プロキシーを設置するかどうかを決定する前に、 [Snowflakeがどのように動作するか](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)について理解しておきましょう。
|
||||
|
||||
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
||||
|
@@ -53,12 +53,12 @@ ISPや公共Wi-Fiネットワーク、またはファイルのTorrent中の、
|
||||
- [:simple-windows11: Windows](https://protonvpn.com/download-windows)
|
||||
- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/)
|
||||
|
||||
#### :material-check:{ .pg-green } 67か国
|
||||
#### :material-check:{ .pg-green } 68 Countries
|
||||
|
||||
Proton VPN has [servers in 67 countries](https://protonvpn.com/vpn-servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
|
||||
Proton VPN has [servers in 68 countries](https://protonvpn.com/vpn-servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
|
||||
{ .annotate }
|
||||
|
||||
1. Last checked: 2022-09-16
|
||||
1. Last checked: 2023-07-28
|
||||
|
||||
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||
|
||||
@@ -123,7 +123,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit
|
||||
IVPN has [servers in 35 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
|
||||
{ .annotate }
|
||||
|
||||
1. Last checked: 2022-09-16
|
||||
1. Last checked: 2023-07-28
|
||||
|
||||
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||
|
||||
@@ -180,12 +180,12 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN
|
||||
- [:simple-apple: macOS](https://mullvad.net/en/download/macos/)
|
||||
- [:simple-linux: Linux](https://mullvad.net/en/download/linux/)
|
||||
|
||||
#### :material-check:{ .pg-green } 41か国
|
||||
#### :material-check:{ .pg-green } 43 Countries
|
||||
|
||||
Mullvad has [servers in 41 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
|
||||
Mullvad has [servers in 43 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
|
||||
{ .annotate }
|
||||
|
||||
1. Last checked: 2023-01-19
|
||||
1. Last checked: 2023-07-28
|
||||
|
||||
We also think it's better for the security of the VPN provider's private keys if they use [dedicated servers](https://en.wikipedia.org/wiki/Dedicated_hosting_service), instead of cheaper shared solutions (with other customers) such as [virtual private servers](https://en.wikipedia.org/wiki/Virtual_private_server).
|
||||
|
||||
|
Reference in New Issue
Block a user