mirror of
https://github.com/privacyguides/i18n.git
synced 2025-09-01 02:49:14 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: About Privacy Guides
|
title: "About Privacy Guides"
|
||||||
description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
|
description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
|
||||||
schema:
|
schema:
|
||||||
"@context": https://schema.org
|
"@context": https://schema.org
|
||||||
@@ -24,7 +24,7 @@ schema:
|
|||||||
[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage }
|
[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage }
|
||||||
[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" }
|
||||||
|
|
||||||
Privacy Guides is built by volunteers and staff members around the world. All changes to our recommendations and resources are reviewed by at least two trusted individuals, and we work diligently to ensure our content is updated as quickly as possible to adapt to the ever-changing cybersecurity threat landscape.
|
Privacy Guides is built by volunteers and staff members around the world. All changes to our recommendations and resources are reviewed by at least two [trusted](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all) individuals, and we work diligently to ensure our content is updated as quickly as possible to adapt to the ever-changing cybersecurity threat landscape.
|
||||||
|
|
||||||
In addition to our core team, [many other people](about/contributors.md) have made contributions to the project. You can too! We're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
|
In addition to our core team, [many other people](about/contributors.md) have made contributions to the project. You can too! We're open source on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
|
||||||
|
|
||||||
@@ -42,7 +42,7 @@ Have a tip for us, or need to share some sensitive information? The best way to
|
|||||||
|
|
||||||
[:simple-signal: Chat on Signal](https://signal.me/#eu/zg9xcrIv5w-EtXt2FmTJgfWv01LmyTed8rpr7RDv35Mizq8ISZ9NJLmYtzsxI0Z4){ .md-button }
|
[:simple-signal: Chat on Signal](https://signal.me/#eu/zg9xcrIv5w-EtXt2FmTJgfWv01LmyTed8rpr7RDv35Mizq8ISZ9NJLmYtzsxI0Z4){ .md-button }
|
||||||
|
|
||||||
You may also email the entire team at <team@privacyguides.org>. This is a shared inbox that could be read by any team member, so please consider what sensitive information you share via email accordingly.
|
You may also email the entire team at <team@privacyguides.org>. This is a shared inbox that could be read by any [team member](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all), so please consider what sensitive information you share via email accordingly.
|
||||||
|
|
||||||
We will do our best to respond to all queries within 3 business days, but please understand we are unable to provide individualized advice to everyone who asks. If you have a question about privacy, you will receive a much more detailed and timely response from the Privacy Guides community by [asking on our forum](https://discuss.privacyguides.net/c/privacy/questions/8).
|
We will do our best to respond to all queries within 3 business days, but please understand we are unable to provide individualized advice to everyone who asks. If you have a question about privacy, you will receive a much more detailed and timely response from the Privacy Guides community by [asking on our forum](https://discuss.privacyguides.net/c/privacy/questions/8).
|
||||||
|
|
||||||
|
@@ -1,22 +1,22 @@
|
|||||||
---
|
---
|
||||||
title: Contributors
|
title: योगदान कर्ता
|
||||||
hide:
|
hide:
|
||||||
- toc
|
- toc
|
||||||
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
|
description: उन योगदानकर्ताओं की पूरी सूची जिन्होंने सामूहिक रूप से गोपनीयता मार्गदर्शिका परियोजना पर बहुत बड़ा प्रभाव डाला है।
|
||||||
---
|
---
|
||||||
|
|
||||||
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->
|
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->
|
||||||
|
|
||||||
This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of **any** kind are welcome to be added to [this list](https://github.com/privacyguides/privacyguides.org/blob/main/.all-contributorsrc), including contributions to Privacy Guides outside this repo, and contributions that aren't content related (like sharing ideas for Privacy Guides, promoting the project, answering questions on the forum, etc.).
|
यह परियोजना [all-contributors](https://github.com/all-contributors/all-contributors) विनिर्देश का पालन करती है। **किसी भी प्रकार** के योगदान को [इस सूची](https://github.com/privacyguides/privacyguides.org/blob/main/.all-contributorsrc) में शामिल करने का स्वागत है, जिसमें इस रेपो के बाहर गोपनीयता मार्गदर्शिकाओं में योगदान और सामग्री से संबंधित नहीं योगदान (जैसे गोपनीयता मार्गदर्शिकाओं के लिए विचार साझा करना, परियोजना को बढ़ावा देना, मंच पर प्रश्नों का उत्तर देना आदि) शामिल हैं।
|
||||||
|
|
||||||
| Emoji | Type | Description |
|
| Emoji | प्रकार | विवरण |
|
||||||
| ----- | ------------- | ----------------------------------------------------------------------------------------------------------------------------------------------- |
|
| ----- | ---------- | ---------------------------------------------------------------------------------------------------------------------------------------- |
|
||||||
| 📖 | `doc` | A contributor to the content on [privacyguides.org](https://www.privacyguides.org/en). |
|
| 📖 | `doc` | [privacyguides.org](https://www.privacyguides.org/en) पर सामग्री के लिए एक योगदानकर्ता। |
|
||||||
| 👀 | `review` | Someone who has taken the time to review [pull requests](https://github.com/privacyguides/privacyguides.org/pulls) to the site. |
|
| 👀 | `review` | कोई व्यक्ति जिसने साइट पर [pull request](https://github.com/privacyguides/privacyguides.org/pulls) की समीक्षा करने के लिए समय निकाला है। |
|
||||||
| 📝 | `blog` | Someone who has written a [blog](https://blog.privacyguides.org) post for us. |
|
| 📝 | `blog` | कोई व्यक्ति जिसने हमारे लिए [blog](https://blog.privacyguides.org) पोस्ट लिखा है। |
|
||||||
| 💬 | `question` | Someone who has been helpful when answering questions on our [forum](https://discuss.privacyguides.net) or Matrix channels. |
|
| 💬 | `question` | कोई ऐसा व्यक्ति जो हमारे [फोरम](https://discuss.privacyguides.net) या मैट्रिक्स चैनलों पर प्रश्नों का उत्तर देते समय मददगार रहा हो। |
|
||||||
| 🌍 | `translation` | Someone who has contributed on [Crowdin](https://crowdin.com/project/privacyguides). |
|
| 🌍 | `अनुवाद` | कोई व्यक्ति जिसने [Crowdin](https://crowdin.com/project/privacyguides) पर योगदान दिया है। |
|
||||||
|
|
||||||
A huge thank you from Privacy Guides to the following wonderful people ([full emoji key](https://allcontributors.org/docs/en/emoji-key)). We also especially thank our dedicated community moderation team on Matrix and our forum: _Austin Huang_, _namazso_, _hik_, _riley_, and _Valynor_.
|
प्राइवेसी गाइड्स की ओर से निम्नलिखित अद्भुत लोगों को बहुत-बहुत धन्यवाद ([full emoji key](https://allcontributors.org/docs/en/emoji-key))। हम मैट्रिक्स और हमारे फोरम पर हमारी समर्पित सामुदायिक मॉडरेशन टीम को भी विशेष रूप से धन्यवाद देते हैं: _Austin Huang_, _namazso_, _hik_, _riley_, और _Valynor_।
|
||||||
|
|
||||||
\--8<-- "includes/contributors.md"
|
\--8<-- "includes/contributors.md"
|
||||||
|
@@ -12,7 +12,7 @@ Privacy Guides aspires to obtain funding from a wide variety of sources to reduc
|
|||||||
In the course of our regular fundraising activities...
|
In the course of our regular fundraising activities...
|
||||||
|
|
||||||
- Donations and other forms of support will generally be accepted from individuals, corporations, foundations, or other entities, without limitations.
|
- Donations and other forms of support will generally be accepted from individuals, corporations, foundations, or other entities, without limitations.
|
||||||
- This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency.
|
- This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency.
|
||||||
- Gifts of Real Property, Personal Property, or Securities may only be accepted upon approval of the MAGIC Grants board of directors.
|
- Gifts of Real Property, Personal Property, or Securities may only be accepted upon approval of the MAGIC Grants board of directors.
|
||||||
|
|
||||||
Privacy Guides will only accept such gifts that are legal and consistent with our policies. Gifts must not interfere with Privacy Guides' mission, purpose, and procedures.
|
Privacy Guides will only accept such gifts that are legal and consistent with our policies. Gifts must not interfere with Privacy Guides' mission, purpose, and procedures.
|
||||||
|
@@ -1,14 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: Job Openings
|
title: नौकरी की रिक्तियां
|
||||||
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
|
description: प्राइवेसी गाइड्स के पास गोपनीयता शोधकर्ताओं और अधिवक्ताओं की एक छोटी, दूरस्थ टीम है। भविष्य में जो भी रिक्तियां होंगी, उन्हें यहां पोस्ट किया जाएगा।
|
||||||
---
|
---
|
||||||
|
|
||||||
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our team members are listed [here](https://discuss.privacyguides.net/u?group=team\&order=solutions\&period=all). Please consider [donating](https://donate.magicgrants.org/privacyguides) to support our cause.
|
प्राइवेसी गाइड्स के पास गोपनीयता शोधकर्ताओं और अधिवक्ताओं की एक छोटी, दूरस्थ टीम है, जो मुक्त अभिव्यक्ति की रक्षा करने और गोपनीयता का सम्मान करने वाली प्रौद्योगिकी को बढ़ावा देने के हमारे मिशन को आगे बढ़ाने के लिए काम कर रही है। एक गैर-लाभकारी संस्था के रूप में, हम यह सुनिश्चित करने के लिए बहुत धीरे-धीरे विस्तार कर रहे हैं कि परियोजना दीर्घावधि में टिकाऊ रहे। हमारी टीम के सभी सदस्य [यहां](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all) सूचीबद्ध हैं। कृपया हमारे उद्देश्य का समर्थन करने के लिए [दान](https://donate.magicgrants.org/privacyguides) पर विचार करें।
|
||||||
|
|
||||||
We are occasionally looking for strong journalistic writers, product reviewers, and privacy experts to help us out, and any open positions will be posted below.
|
हम समय-समय पर हमारी मदद करने के लिए मजबूत पत्रकारिता लेखकों, उत्पाद समीक्षकों और गोपनीयता विशेषज्ञों की तलाश करते रहते हैं, और किसी भी खाली पद की जानकारी नीचे पोस्ट की जाएगी।
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Open Positions
|
## रिक्त पद
|
||||||
|
|
||||||
There are no open positions at this time.
|
इस समय कोई रिक्त पद नहीं है।
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
meta_title: "Recommended AI Chat: Private ChatGPT Alternatives - Privacy Guides"
|
meta_title: "Recommended AI Chat: Private ChatGPT Alternatives - Privacy Guides"
|
||||||
title: AI Chat
|
title: "AI Chat"
|
||||||
icon: material/assistant
|
icon: material/assistant
|
||||||
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
|
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
|
||||||
cover: ai-chatbots.webp
|
cover: ai-chatbots.webp
|
||||||
@@ -163,7 +163,7 @@ To check the authenticity and safety of the model, look for:
|
|||||||
- Community reviews and usage statistics
|
- Community reviews and usage statistics
|
||||||
- A "Safe" badge next to the model file (Hugging Face only)
|
- A "Safe" badge next to the model file (Hugging Face only)
|
||||||
- Matching checksums[^1]
|
- Matching checksums[^1]
|
||||||
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
|
- On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded.
|
||||||
|
|
||||||
A downloaded model is generally safe if it satisfies all the above checks.
|
A downloaded model is generally safe if it satisfies all the above checks.
|
||||||
|
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Alternative Networks
|
title: "Alternative Networks"
|
||||||
icon: material/vector-polygon
|
icon: material/vector-polygon
|
||||||
description: These tools allow you to access networks other than the World Wide Web.
|
description: These tools allow you to access networks other than the World Wide Web.
|
||||||
cover: alternative-networks.webp
|
cover: alternative-networks.webp
|
||||||
|
@@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
meta_title: The Best Android Operating Systems - Privacy Guides
|
meta_title: "The Best Android Operating Systems - Privacy Guides"
|
||||||
title: Alternative Distributions
|
title: "Alternative Distributions"
|
||||||
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
||||||
schema:
|
schema:
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: Private Android Operating Systems
|
name: Private Android Operating Systems
|
||||||
url: ./
|
url: "./"
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": CreativeWork
|
"@type": CreativeWork
|
||||||
name: GrapheneOS
|
name: GrapheneOS
|
||||||
@@ -16,7 +16,7 @@ schema:
|
|||||||
subjectOf:
|
subjectOf:
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
url: ./
|
url: "./"
|
||||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: General Apps
|
title: "General Apps"
|
||||||
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||||
schema:
|
schema:
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: General Android Apps
|
name: General Android Apps
|
||||||
url: ./
|
url: "./"
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": MobileApplication
|
"@type": MobileApplication
|
||||||
name: Shelter
|
name: Shelter
|
||||||
|
@@ -1,13 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: Android
|
title: "Android"
|
||||||
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
|
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
|
||||||
icon: simple/android
|
icon: 'simple/android'
|
||||||
cover: android.webp
|
cover: android.webp
|
||||||
schema:
|
schema:
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: Android Recommendations
|
name: Android Recommendations
|
||||||
url: ./
|
url: "./"
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": CreativeWork
|
"@type": CreativeWork
|
||||||
name: Android
|
name: Android
|
||||||
@@ -38,7 +38,7 @@ There are also many private alternatives to the apps that come pre-installed on
|
|||||||
|
|
||||||
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
|
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
|
||||||
|
|
||||||
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require more permissive SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
|
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
|
||||||
|
|
||||||
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:
|
Ideally, when choosing a custom Android distribution, you should make sure that it upholds the Android security model. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:
|
||||||
|
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Obtaining Applications
|
title: "Obtaining Applications"
|
||||||
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
|
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -86,26 +86,26 @@ If you download APK files to install manually, you can verify their signature wi
|
|||||||
|
|
||||||
3. Extract the downloaded archive:
|
3. Extract the downloaded archive:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
unzip commandlinetools-*.zip
|
unzip commandlinetools-*.zip
|
||||||
cd cmdline-tools
|
cd cmdline-tools
|
||||||
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Run the signature verification command:
|
4. Run the signature verification command:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
||||||
```
|
```
|
||||||
|
|
||||||
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
|
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
Signer #1 certificate DN: CN=GrapheneOS
|
Signer #1 certificate DN: CN=GrapheneOS
|
||||||
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
||||||
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
||||||
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
||||||
```
|
```
|
||||||
|
|
||||||
## F-Droid
|
## F-Droid
|
||||||
|
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Choosing Your Hardware
|
title: "Choosing Your Hardware"
|
||||||
icon: material/chip
|
icon: 'material/chip'
|
||||||
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
description: Software isn't all that matters; learn about the hardware tools you use every day to protect your privacy.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Device Integrity
|
title: "Device Integrity"
|
||||||
icon: material/security
|
icon: material/security
|
||||||
description: These tools can be used to check your devices for compromise.
|
description: These tools can be used to check your devices for compromise.
|
||||||
cover: device-integrity.webp
|
cover: device-integrity.webp
|
||||||
@@ -102,7 +102,7 @@ If you use iOS and are at high-risk, we have three additional suggestions for yo
|
|||||||
|
|
||||||
2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.
|
2. Trigger _sysdiagnose_ logs often and back them up externally. These logs can provide invaluable data to future forensic investigators if need be.
|
||||||
|
|
||||||
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
|
The process to do so varies by model, but you can trigger it on newer phones by holding down _Power_ + _Volume Up_ + _Volume Down_ until you feel a brief vibration. After a few minutes, the timestamped _sysdiagnose_ log will appear in **Settings** > **Privacy & Security** > **Analytics & Improvements** > **Analytics Data**.
|
||||||
|
|
||||||
3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).
|
3. Enable [Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode).
|
||||||
|
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Document Collaboration
|
title: "Document Collaboration"
|
||||||
icon: material/account-group
|
icon: material/account-group
|
||||||
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
|
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
|
||||||
cover: document-collaboration.webp
|
cover: document-collaboration.webp
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Email Aliasing
|
title: "Email Aliasing"
|
||||||
icon: material/email-lock
|
icon: material/email-lock
|
||||||
description: An email aliasing service allows you to easily generate a new email address for every website you register for.
|
description: An email aliasing service allows you to easily generate a new email address for every website you register for.
|
||||||
cover: email-aliasing.webp
|
cover: email-aliasing.webp
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
meta_title: Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides
|
meta_title: "Privacy-Respecting Health and Wellness apps for Android and iOS - Privacy Guides"
|
||||||
title: Health and Wellness
|
title: "Health and Wellness"
|
||||||
icon: material/heart-pulse
|
icon: material/heart-pulse
|
||||||
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
|
description: These applications are what we currently recommend for all health- and fitness-related activites on your phone.
|
||||||
cover: health.webp
|
cover: health.webp
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Language Tools
|
title: "Language Tools"
|
||||||
icon: material/alphabetical-variant
|
icon: material/alphabetical-variant
|
||||||
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
|
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
|
||||||
cover: language-tools.webp
|
cover: language-tools.webp
|
||||||
|
@@ -1,9 +1,9 @@
|
|||||||
---
|
---
|
||||||
title: Branding Guidelines
|
title: ब्रांडिंग दिशानिर्देश
|
||||||
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
|
description: पत्रकारों और वेबसाइट योगदानकर्ताओं के लिए गोपनीयता मार्गदर्शिका वर्डमार्क और लोगो की उचित ब्रांडिंग पर एक मार्गदर्शिका ।
|
||||||
---
|
---
|
||||||
|
|
||||||
The name of the website is **Privacy Guides** and should **not** be changed to:
|
वेबसाइट का नाम **गोपनीयता मार्गदर्शिकाएँ** है और इसे **नहीं** बदला जाना चाहिए:
|
||||||
|
|
||||||
<div class="pg-red" markdown>
|
<div class="pg-red" markdown>
|
||||||
- PrivacyGuides
|
- PrivacyGuides
|
||||||
@@ -12,12 +12,12 @@ The name of the website is **Privacy Guides** and should **not** be changed to:
|
|||||||
- PG.org
|
- PG.org
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
The name of the Subreddit is **r/PrivacyGuides** or **the Privacy Guides Subreddit**.
|
Subreddit का नाम **r/PrivacyGuides** या **Privacy Guides Subreddit** है।
|
||||||
|
|
||||||
Additional branding guidelines can be found at [github.com/privacyguides/brand](https://github.com/privacyguides/brand)
|
अतिरिक्त ब्रांडिंग दिशानिर्देश [github.com/privacyguides/brand](https://github.com/privacyguides/brand) पर देखे जा सकते हैं
|
||||||
|
|
||||||
## Trademark
|
## ट्रेडमार्क चिह्न
|
||||||
|
|
||||||
"Privacy Guides" and the shield logo are trademarks owned by Jonah Aragon, unlimited usage is granted to the Privacy Guides project.
|
"Privacy Guides" और शील्ड लोगो Jonah Aragon के स्वामित्व वाले ट्रेडमार्क हैं, Privacy Guides परियोजना को असीमित उपयोग की अनुमति है।
|
||||||
|
|
||||||
Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. If you are aware of any such use, please contact Jonah Aragon at `jonah@privacyguides.org`. Consult your legal counsel if you have questions.
|
अपने किसी भी अधिकार का परित्याग किए बिना, Privacy Guidesअपने बौद्धिक संपदा अधिकारों के दायरे के बारे में दूसरों को सलाह नहीं देता है। Privacy Guides अपने ट्रेडमार्क के किसी भी ऐसे उपयोग की अनुमति या सहमति नहीं देता है, जिससे Privacy Guidesके साथ जुड़ाव या प्रायोजन का आभास होने के कारण भ्रम की स्थिति पैदा होने की संभावना हो। यदि आप ऐसे किसी उपयोग के बारे में जानते हैं, तो कृपया Jonah Aragon से `jonah@privacyguides.org` पर संपर्क करें। यदि आपके कोई प्रश्न हों तो अपने कानूनी सलाहकार से परामर्श लें।
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Mobile Phones
|
title: "Mobile Phones"
|
||||||
icon: material/cellphone-check
|
icon: material/cellphone-check
|
||||||
description: These mobile devices provide the best hardware security support for custom Android operating systems.
|
description: These mobile devices provide the best hardware security support for custom Android operating systems.
|
||||||
cover: android.webp
|
cover: android.webp
|
||||||
@@ -7,7 +7,7 @@ schema:
|
|||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": WebPage
|
"@type": WebPage
|
||||||
name: Mobile Phone Recommendations
|
name: Mobile Phone Recommendations
|
||||||
url: ./
|
url: "./"
|
||||||
- "@context": http://schema.org
|
- "@context": http://schema.org
|
||||||
"@type": Product
|
"@type": Product
|
||||||
name: Pixel
|
name: Pixel
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Office Suites
|
title: "Office Suites"
|
||||||
icon: material/file-edit-outline
|
icon: material/file-edit-outline
|
||||||
description: These office suites offer their full functionality without an account and can be used offline.
|
description: These office suites offer their full functionality without an account and can be used offline.
|
||||||
cover: office-suites.webp
|
cover: office-suites.webp
|
||||||
@@ -48,7 +48,7 @@ Choose an **office suite** that does not require logging in to an account to acc
|
|||||||
**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud.
|
**OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502\&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation}
|
[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
@@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th
|
|||||||
#### Device Guard
|
#### Device Guard
|
||||||
|
|
||||||
- Turn On Virtualization Based Security: **Enabled**
|
- Turn On Virtualization Based Security: **Enabled**
|
||||||
- Platform Security Level: **Secure Boot and DMA Protection**
|
- Platform Security Level: **Secure Boot and DMA Protection**
|
||||||
- Secure Launch Configuration: **Enabled**
|
- Secure Launch Configuration: **Enabled**
|
||||||
|
|
||||||
#### Internet Communication Management
|
#### Internet Communication Management
|
||||||
|
|
||||||
@@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform
|
|||||||
- Turn off AutoPlay: **Enabled**
|
- Turn off AutoPlay: **Enabled**
|
||||||
- Disallow Autoplay for nonvolume devices: **Enabled**
|
- Disallow Autoplay for nonvolume devices: **Enabled**
|
||||||
- Set the default behavior for AutoRun: **Enabled**
|
- Set the default behavior for AutoRun: **Enabled**
|
||||||
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
|
- Default AutoRun Behavior: **Do not execute any AutoRun commands**
|
||||||
|
|
||||||
#### BitLocker Drive Encryption
|
#### BitLocker Drive Encryption
|
||||||
|
|
||||||
You may wish to re-encrypt your operating system drive after changing these settings.
|
You may wish to re-encrypt your operating system drive after changing these settings.
|
||||||
|
|
||||||
- Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled**
|
- Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled**
|
||||||
- Select the encryption method: **AES-256**
|
- Select the encryption method: **AES-256**
|
||||||
|
|
||||||
Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows.
|
Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows.
|
||||||
|
|
||||||
@@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b
|
|||||||
#### Data Collection and Preview Builds
|
#### Data Collection and Preview Builds
|
||||||
|
|
||||||
- Allow Diagnostic Data: **Enabled**
|
- Allow Diagnostic Data: **Enabled**
|
||||||
- Options: **Send required diagnostic data** (Pro Edition); or
|
- Options: **Send required diagnostic data** (Pro Edition); or
|
||||||
- Options: **Diagnostic data off** (Enterprise or Education Edition)
|
- Options: **Diagnostic data off** (Enterprise or Education Edition)
|
||||||
- Limit Diagnostic Log Collection: **Enabled**
|
- Limit Diagnostic Log Collection: **Enabled**
|
||||||
- Limit Dump Collection: **Enabled**
|
- Limit Dump Collection: **Enabled**
|
||||||
- Limit optional diagnostic data for Desktop Analytics: **Enabled**
|
- Limit optional diagnostic data for Desktop Analytics: **Enabled**
|
||||||
- Options: **Disable Desktop Analytics collection**
|
- Options: **Disable Desktop Analytics collection**
|
||||||
- Do not show feedback notifications: **Enabled**
|
- Do not show feedback notifications: **Enabled**
|
||||||
|
|
||||||
#### File Explorer
|
#### File Explorer
|
||||||
@@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to **
|
|||||||
- Allow Cortana: **Disabled**
|
- Allow Cortana: **Disabled**
|
||||||
- Don't search the web or display web results in Search: **Enabled**
|
- Don't search the web or display web results in Search: **Enabled**
|
||||||
- Set what information is shared in Search: **Enabled**
|
- Set what information is shared in Search: **Enabled**
|
||||||
- Type of information: **Anonymous info**
|
- Type of information: **Anonymous info**
|
||||||
|
|
||||||
#### Sync your settings
|
#### Sync your settings
|
||||||
|
|
||||||
@@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to **
|
|||||||
|
|
||||||
- Do not send additional data: **Enabled**
|
- Do not send additional data: **Enabled**
|
||||||
- Consent > Configure Default consent: **Enabled**
|
- Consent > Configure Default consent: **Enabled**
|
||||||
- Consent level: **Always ask before sending data**
|
- Consent level: **Always ask before sending data**
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Pastebins
|
title: "Pastebins"
|
||||||
icon: material/content-paste
|
icon: material/content-paste
|
||||||
description: These tools allow you to have full control of any pasted data you share to other parties.
|
description: These tools allow you to have full control of any pasted data you share to other parties.
|
||||||
cover: pastebins.webp
|
cover: pastebins.webp
|
||||||
|
@@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: Privacy Policy
|
title: "Privacy Policy"
|
||||||
description: We do not sell or share your data with any third-parties.
|
description: We do not sell or share your data with any third-parties.
|
||||||
---
|
---
|
||||||
|
|
||||||
## What is Privacy Guides?
|
## What is Privacy Guides?
|
||||||
|
|
||||||
Privacy Guides is a community project operated by a number of active contributors. The public list of team members can be found on our forum. Privacy Guides is legally administered by MAGIC Grants, a 501(c)(3) public charity acting as our fiscal host.
|
Privacy Guides is a community project operated by a number of active contributors. The public list of team members [can be found on our forum](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all). Privacy Guides is legally administered by [MAGIC Grants](https://magicgrants.org), a 501(c)(3) public charity acting as our fiscal host.
|
||||||
|
|
||||||
As a project, we make available to the public:
|
As a project, we make available to the public:
|
||||||
|
|
||||||
@@ -230,7 +230,7 @@ Currently:
|
|||||||
|
|
||||||
- Privacy Guides [processes personal data on servers outside the European Union](#where-does-privacy-guides-store-data-about-me).
|
- Privacy Guides [processes personal data on servers outside the European Union](#where-does-privacy-guides-store-data-about-me).
|
||||||
- Privacy Guides uses [subprocessors](#subprocessors-used-by-privacy-guides) with personnel and computers outside the European Union.
|
- Privacy Guides uses [subprocessors](#subprocessors-used-by-privacy-guides) with personnel and computers outside the European Union.
|
||||||
- Privacy Guides has personnel in the United States, Australia, and other non-EU countries without EU adequacy decisions under GDPR. These people need access to forum personal data in order to keep forums running, address security concerns, respond to privacy-related requests from users, field technical support requests, and otherwise assist users.
|
- Privacy Guides has [personnel](https://discuss.privacyguides.net/u?group=team&order=solutions&period=all) in the United States, Australia, and other non-EU countries without EU adequacy decisions under GDPR. These people need access to forum personal data in order to keep forums running, address security concerns, respond to privacy-related requests from users, field technical support requests, and otherwise assist users.
|
||||||
- Privacy Guides is very likely subject to section 702 of the Foreign Intelligence Surveillance Act in the United States, a law that the European Court of Justice has found inadequately protects the rights and freedoms of data subjects.
|
- Privacy Guides is very likely subject to section 702 of the Foreign Intelligence Surveillance Act in the United States, a law that the European Court of Justice has found inadequately protects the rights and freedoms of data subjects.
|
||||||
- Privacy Guides has never received any order or request for personal data under FISA 702 or any similar national security or surveillance law of any other country. Privacy Guides is not subject to any court order or legal obligation that would prevent it from disclosing the existence or non-existence of such an order or request.
|
- Privacy Guides has never received any order or request for personal data under FISA 702 or any similar national security or surveillance law of any other country. Privacy Guides is not subject to any court order or legal obligation that would prevent it from disclosing the existence or non-existence of such an order or request.
|
||||||
- Privacy Guides has a policy for how we will respond to those orders and requests, in case we ever receive one. Privacy Guides will suspend processing, notify any affected user, minimize disclosure, and resist disclosure of personal data, all as the law allows.
|
- Privacy Guides has a policy for how we will respond to those orders and requests, in case we ever receive one. Privacy Guides will suspend processing, notify any affected user, minimize disclosure, and resist disclosure of personal data, all as the law allows.
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Security Keys
|
title: "Security Keys"
|
||||||
icon: material/key-chain
|
icon: material/key-chain
|
||||||
description: These security keys provide a form of phishing-immune authentication for accounts that support it.
|
description: These security keys provide a form of phishing-immune authentication for accounts that support it.
|
||||||
cover: multi-factor-authentication.webp
|
cover: multi-factor-authentication.webp
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Email Servers
|
title: Email Servers
|
||||||
meta_title: Self-Hosted Email - Privacy Guides
|
meta_title: "Self-Hosted Email - Privacy Guides"
|
||||||
icon: material/email
|
icon: material/email
|
||||||
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
|
description: For our more technical readers, self-hosting your own email can provide additional privacy assurances by having maximum control over your data.
|
||||||
cover: email.webp
|
cover: email.webp
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Self-Hosting
|
title: Self-Hosting
|
||||||
meta_title: Self-Hosted Software and Services - Privacy Guides
|
meta_title: "Self-Hosted Software and Services - Privacy Guides"
|
||||||
description: For our more technical readers, self-hosted software and services can provide additional privacy assurances since you have maximum control over your data.
|
description: For our more technical readers, self-hosted software and services can provide additional privacy assurances since you have maximum control over your data.
|
||||||
cover: router.webp
|
cover: router.webp
|
||||||
---
|
---
|
||||||
|
@@ -36,9 +36,9 @@ If you are greatly concerned about an existing server censoring your content, th
|
|||||||
|
|
||||||
2. **Use a managed hosting service.** We don't have any specific recommendations, but there are a variety of hosting services which will create a brand-new server on your own domain (or occasionally a subdomain of their domain, but we recommend against this unless registering your own domain presents too much of a burden to your privacy).
|
2. **Use a managed hosting service.** We don't have any specific recommendations, but there are a variety of hosting services which will create a brand-new server on your own domain (or occasionally a subdomain of their domain, but we recommend against this unless registering your own domain presents too much of a burden to your privacy).
|
||||||
|
|
||||||
Typically, hosting providers will handle the _technical_ side of your server, but completely leave the _moderation_ side up to you. This often represents a better approach than self-hosting for most people because you can benefit from greater control over your own server without worrying about technical problems or unpatched security vulnerabilities.
|
Typically, hosting providers will handle the _technical_ side of your server, but completely leave the _moderation_ side up to you. This often represents a better approach than self-hosting for most people because you can benefit from greater control over your own server without worrying about technical problems or unpatched security vulnerabilities.
|
||||||
|
|
||||||
You should look closely at your hosting provider's terms of service and acceptable use policies before registering. These are often far more broad than typical hosted server rules, and they are far less likely to be enforced without recourse, but they can still be restrictive in undesirable ways.
|
You should look closely at your hosting provider's terms of service and acceptable use policies before registering. These are often far more broad than typical hosted server rules, and they are far less likely to be enforced without recourse, but they can still be restrictive in undesirable ways.
|
||||||
|
|
||||||
## Mastodon
|
## Mastodon
|
||||||
|
|
||||||
|
@@ -122,7 +122,7 @@ We are noting this because while we don't necessarily recommend against sharing
|
|||||||
|
|
||||||
#### :material-information-outline:{ .pg-blue } Дополнительные замечания
|
#### :material-information-outline:{ .pg-blue } Дополнительные замечания
|
||||||
|
|
||||||
Клиенты Proton VPN поддерживают двухфакторную аутентификацию на всех платформах. Proton VPN имеет собственные серверы и дата-центры в Швейцарии, Исландии и Швеции. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](tor.md#tor-browser) for this purpose.
|
Клиенты Proton VPN поддерживают двухфакторную аутентификацию на всех платформах. Proton VPN имеет собственные серверы и дата-центры в Швейцарии, Исландии и Швеции. Они предлагают блокировку контента и блокировку известного вредоносного ПО с помощью своей DNS-службы. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](tor.md#tor-browser) for this purpose.
|
||||||
|
|
||||||
##### :material-alert-outline:{ .pg-orange } Функция Kill switch работает неисправно на компьютерах Mac на базе Intel
|
##### :material-alert-outline:{ .pg-orange } Функция Kill switch работает неисправно на компьютерах Mac на базе Intel
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user