diff --git a/i18n/ar/assets/img/ios/contact-permissions-dark.png b/i18n/ar/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/ar/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/ar/assets/img/ios/contact-permissions-light.png b/i18n/ar/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/ar/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/ar/assets/img/ios/photo-permissions-dark.png b/i18n/ar/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/ar/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/ar/assets/img/ios/photo-permissions-light.png b/i18n/ar/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/ar/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/ar/assets/img/ios/private-access-dark.png b/i18n/ar/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/ar/assets/img/ios/private-access-dark.png differ diff --git a/i18n/ar/assets/img/ios/private-access-light.png b/i18n/ar/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/ar/assets/img/ios/private-access-light.png differ diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/ar/os/ios-overview.md b/i18n/ar/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/ar/os/ios-overview.md +++ b/i18n/ar/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index aa493caf..656e2983 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index b4416a2f..1ef1f39f 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/bn-IN/assets/img/ios/contact-permissions-dark.png b/i18n/bn-IN/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/bn-IN/assets/img/ios/contact-permissions-light.png b/i18n/bn-IN/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/bn-IN/assets/img/ios/photo-permissions-dark.png b/i18n/bn-IN/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/bn-IN/assets/img/ios/photo-permissions-light.png b/i18n/bn-IN/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/bn-IN/assets/img/ios/private-access-dark.png b/i18n/bn-IN/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/private-access-dark.png differ diff --git a/i18n/bn-IN/assets/img/ios/private-access-light.png b/i18n/bn-IN/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/bn-IN/assets/img/ios/private-access-light.png differ diff --git a/i18n/bn-IN/mobile-browsers.md b/i18n/bn-IN/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/bn-IN/mobile-browsers.md +++ b/i18n/bn-IN/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/bn-IN/os/ios-overview.md b/i18n/bn-IN/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/bn-IN/os/ios-overview.md +++ b/i18n/bn-IN/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/bn-IN/passwords.md b/i18n/bn-IN/passwords.md index 23234b87..656e2983 100644 --- a/i18n/bn-IN/passwords.md +++ b/i18n/bn-IN/passwords.md @@ -22,7 +22,7 @@ schema: - Windows - macOS - Linux - - অ্যান্ড্রয়েড + - Android - iOS subjectOf: "@context": http://schema.org @@ -40,7 +40,7 @@ schema: - Windows - macOS - Linux - - অ্যান্ড্রয়েড + - Android - iOS subjectOf: "@context": http://schema.org @@ -54,7 +54,7 @@ schema: url: https://proton.me/pass applicationCategory: Password Manager operatingSystem: - - অ্যান্ড্রয়েড + - Android - iOS subjectOf: "@context": http://schema.org @@ -68,7 +68,7 @@ schema: url: https://psono.com applicationCategory: Password Manager operatingSystem: - - অ্যান্ড্রয়েড + - Android - iOS subjectOf: "@context": http://schema.org @@ -97,7 +97,7 @@ schema: image: /assets/img/password-management/keepassdx.svg url: https://keepassdx.com applicationCategory: Password Manager - operatingSystem: অ্যান্ড্রয়েড + operatingSystem: Android subjectOf: "@context": http://schema.org "@type": WebPage @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index cfaf4cb2..9b298a10 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/bn/assets/img/ios/contact-permissions-dark.png b/i18n/bn/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/bn/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/bn/assets/img/ios/contact-permissions-light.png b/i18n/bn/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/bn/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/bn/assets/img/ios/photo-permissions-dark.png b/i18n/bn/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/bn/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/bn/assets/img/ios/photo-permissions-light.png b/i18n/bn/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/bn/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/bn/assets/img/ios/private-access-dark.png b/i18n/bn/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/bn/assets/img/ios/private-access-dark.png differ diff --git a/i18n/bn/assets/img/ios/private-access-light.png b/i18n/bn/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/bn/assets/img/ios/private-access-light.png differ diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/bn/os/ios-overview.md b/i18n/bn/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/bn/os/ios-overview.md +++ b/i18n/bn/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index aa493caf..656e2983 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index cfaf4cb2..9b298a10 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/cs/assets/img/ios/contact-permissions-dark.png b/i18n/cs/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/cs/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/cs/assets/img/ios/contact-permissions-light.png b/i18n/cs/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/cs/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/cs/assets/img/ios/photo-permissions-dark.png b/i18n/cs/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/cs/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/cs/assets/img/ios/photo-permissions-light.png b/i18n/cs/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/cs/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/cs/assets/img/ios/private-access-dark.png b/i18n/cs/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/cs/assets/img/ios/private-access-dark.png differ diff --git a/i18n/cs/assets/img/ios/private-access-light.png b/i18n/cs/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/cs/assets/img/ios/private-access-light.png differ diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/cs/os/ios-overview.md b/i18n/cs/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/cs/os/ios-overview.md +++ b/i18n/cs/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index aa493caf..656e2983 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index cfaf4cb2..9b298a10 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/de/assets/img/ios/contact-permissions-dark.png b/i18n/de/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/de/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/de/assets/img/ios/contact-permissions-light.png b/i18n/de/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/de/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/de/assets/img/ios/photo-permissions-dark.png b/i18n/de/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/de/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/de/assets/img/ios/photo-permissions-light.png b/i18n/de/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/de/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/de/assets/img/ios/private-access-dark.png b/i18n/de/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/de/assets/img/ios/private-access-dark.png differ diff --git a/i18n/de/assets/img/ios/private-access-light.png b/i18n/de/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/de/assets/img/ios/private-access-light.png differ diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index 8c3f6569..09fa1486 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -233,7 +233,7 @@ Unter iOS [muss](https://developer.apple.com/app-store/review/guidelines) jede A ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** ist der Standard-Browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. Außerdem kannst du dein Browsing mit verschiedenen Profilen trennen und private Tabs mit deinen biometrischen Daten/PIN sperren. +**Safari** ist der Standard-Browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Datenschutz" } @@ -247,35 +247,33 @@ Unter iOS [muss](https://developer.apple.com/app-store/review/guidelines) jede A We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -Die folgenden datenschutz- und sicherheitsrelevanten Optionen findest du in der App :gear: **Einstellungen** → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profile -Alle deine Cookies, dein Verlauf und deine Website-Daten werden für jedes Profil separat gespeichert. Du solltest verschiedene Profile für verschiedene Zwecke verwenden, z. B. Einkaufen, Arbeit oder Schule. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Datenschutz & Sicherheit -- [x] Aktivieren Sie **Cross-Sitetracking verhindern** +- [x] Enable **Prevent Cross-Site Tracking** - Dies ermöglicht WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). Die Funktion schützt vor unerwünschtem Tracking, indem sie maschinelles Lernen auf dem Gerät nutzt, um Tracker zu stoppen. Der verbesserte Schutz vor Aktivitätenverfolgung schützt vor vielen gängigen Bedrohungen, aber er blockiert nicht alle Tracking-Möglichkeiten, da er so konzipiert ist, dass die Benutzung der Webseite nicht oder nur minimal beeinträchtigt wird. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Aktiviere **Face ID zum Entsperren von „Privates Surfen“ anfordern** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - Mit dieser Einstellung kannst du deine privaten Tabs bei Nichtgebrauch mit Biometrie/PIN sperren. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Erweitert → Datenschutz +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations Bei der Einstellung **Erweiterter Tracking- und Identifizierungsschutz** werden bestimmte Werte zufällig ausgewählt, sodass es schwieriger ist, deine Fingerabdrücke zu erkennen: - [x] Wähle **Beim Surfen immer** oder **Privates Surfen** -#### Datenschutzbericht - -Der Datenschutzbericht bietet eine Momentaufnahme der Cross-Site-Tracker, die derzeit daran gehindert werden, auf der von Ihnen besuchten Website ein Profil zu erstellen. Es kann auch einen wöchentlichen Bericht anzeigen, aus dem hervorgeht, welche Tracker im Laufe der Zeit blockiert wurden. - -Der Datenschutzbericht ist über das Menü "Website-Einstellungen" zugänglich. - -#### Datenschutzkonforme Werbemessung +##### Datenschutzkonforme Werbemessung - [ ] Deaktiviere **Datenschutzwahrende Werbungsmessung** @@ -285,23 +283,23 @@ Die Funktion hat an sich wenig Datenschutzbedenken. Du kannst sie zwar aktiviert #### Always-on Private Browsing -Öffne Safari und tippe unten rechts auf die Schaltfläche "Tabs". Erweiter dann die Liste der Tabgruppen. +Öffne Safari und tippe unten rechts auf die Schaltfläche "Tabs". Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Wähle **Privat** Der Modus "Privates Surfen" von Safari bietet zusätzlichen Schutz für die Privatsphäre. Private Browsing verwendet eine neue [kurzlebige](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) Sitzung für jedn Tab, was bedeutet, dass die Tabs voneinander isoliert sind. Private Browsing bietet noch weitere kleinere Vorteile für den Datenschutz, z. B. wird die Adresse einer Webseite nicht an Apple gesendet, wenn die Übersetzungsfunktion von Safari verwendet wird. -Beachte, dass Private Browsing keine Cookies und Website-Daten speichert, sodass es nicht möglich ist, auf Websites angemeldet zu bleiben. Dies kann zu Unannehmlichkeiten führen. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Dies kann zu Unannehmlichkeiten führen. #### iCloud Sync Die Synchronisierung von Safari-Verlauf, Tab-Gruppen, iCloud-Tabs und gespeicherten Kennwörtern erfolgt über E2EE. Allerdings werden Lesezeichen standardmäßig [nicht](https://support.apple.com/HT202303) verschlüsselt. Apple kann sie entschlüsseln und in Übereinstimmung mit der [Datenschutzrichtlinie](https://apple.com/legal/privacy/en-ww) darauf zugreifen. -Du kannst E2EE für deine Safari-Lesezeichen und Downloads aktivieren, indem du [Erweiterten Datenschutz](https://support.apple.com/de-de/108756) aktivierst. Gehe zu deinem **Apple ID-Namen → iCloud → Erweiterter Datenschutz**. +Du kannst E2EE für deine Safari-Lesezeichen und Downloads aktivieren, indem du [Erweiterten Datenschutz](https://support.apple.com/de-de/108756) aktivierst. Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Wähle **Erweiterten Datenschutz aktivieren** +- [x] Turn on **Advanced Data Protection** -Wenn du iCloud mit deaktiviertem erweitertem Datenschutz verwendest, empfehlen wir auch zu überprüfen, ob der Standard-Ladeort von Safari auf deinem Gerät lokal eingestellt ist. Diese Option ist zu finden unter :gear: **Einstellungen** → **Safari** → **Allgemein** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Kriterien diff --git a/i18n/de/os/ios-overview.md b/i18n/de/os/ios-overview.md index 389f80d4..ad6a3dbd 100644 --- a/i18n/de/os/ios-overview.md +++ b/i18n/de/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS ist ein mobiles Betriebssystem, das von Apple für das iPhone e iOS-Geräte werden von Sicherheitsexperten häufig für ihren robusten Datenschutz und die Einhaltung moderner Best Practices gelobt. Die Restriktionen des Apple-Ökosystems - insbesondere bei den mobilen Geräten - behindern die Privatsphäre jedoch nach wie vor in vielerlei Hinsicht. -Wir sind generell der Meinung, dass iOS für die meisten Menschen einen überdurchschnittlichen Schutz der Privatsphäre und Sicherheit bietet, verglichen mit Android-Geräten aller Hersteller. Mit einem [Custom Android-Betriebssystem](../android/distributions.md#aosp-derivatives) wie GrapheneOS kannst du jedoch noch höhere Datenschutzstandards erreichen, wenn du völlig unabhängig von den Cloud-Diensten von Apple oder Google sein willst oder musst. +Wir sind generell der Meinung, dass iOS für die meisten Menschen einen überdurchschnittlichen Schutz der Privatsphäre und Sicherheit bietet, verglichen mit Android-Geräten aller Hersteller. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Obligatorischer App Store -Die einzige Quelle für Apps unter iOS ist der App Store von Apple, für den eine Apple-ID erforderlich ist. Das bedeutet, dass Apple über jede App, die du auf deinem Gerät installieren, einen Datensatz hat und diese Informationen wahrscheinlich mit deiner tatsächlichen Identität verknüpfen kann, wenn du im App Store eine Zahlungsmethode angibst. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Das bedeutet, dass Apple über jede App, die du auf deinem Gerät installieren, einen Datensatz hat und diese Informationen wahrscheinlich mit deiner tatsächlichen Identität verknüpfen kann, wenn du im App Store eine Zahlungsmethode angibst. ### Invasive Telemetrie @@ -28,6 +28,8 @@ Kürzlich wurde festgestellt, dass Apple [Analysedaten auch dann übermittelt, w ## Empfohlene Konfiguration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index 28d892c2..3c076222 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Integrierte Passwortmanager in Software wie Browsern und Betriebssystemen sind manchmal nicht so gut wie spezielle Passwortmanager-Software. Der Vorteil eines integrierten Passwortmanagers ist die gute Integration in die Software, aber er ist oft sehr einfach und verfügt nicht über die Datenschutz- und Sicherheitsfunktionen, die eigenständige Angebote bieten. +Integrierte Passwortmanager in Software wie Browsern und Betriebssystemen sind manchmal nicht so gut wie spezielle Passwortmanager-Software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Der Passwort-Manager in Microsoft Edge bietet zum Beispiel überhaupt kein E2EE. Googles Passwortmanager hat [optional](https://support.google.com/accounts/answer/11350823) E2EE, und [Apples](https://support.apple.com/HT202303) bietet standardmäßig E2EE. @@ -164,16 +164,16 @@ Diese Passwort-Manager synchronisieren deine Passwörter mit einem Cloud-Server, **Bitwarden** ist ein kostenloser und quelloffener Passwort- und Passkey-Manager. Es zielt darauf ab, Passwortmanagementprobleme für Einzelpersonen, Teams und Unternehmen zu lösen. Bitwarden ist eine der besten und sichersten Lösungen, um alle deine Logins und Passwörter zu speichern und sie bequem zwischen all deinen Geräten zu synchronisieren. [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Quellcode" } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Der serverseitige Code von Bitwarden ist [quelloffen](https://github.com/bitward **Vaultwarden** ist eine alternative Implementierung des Sync-Servers von Bitwarden, die in Rust geschrieben wurde und mit den offiziellen Bitwarden-Clients kompatibel ist. Sie eignet sich perfekt für den selbstgehosteten Einsatz, wenn der ressourcenintensive offizielle Dienst nicht ideal ist. Wenn du Bitwarden auf deinem eigenen Server hosten willst, wirst du mit ziemlicher Sicherheit lieber Vaultwarden als den offiziellen Servercode von Bitwarden verwenden wollen. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Spenden } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -207,9 +207,9 @@ Der serverseitige Code von Bitwarden ist [quelloffen](https://github.com/bitward **Proton Pass** ist ein quelloffener, E2EE Passwort-Manager, der von Proton entwickelt wurde, dem Team hinter [Proton Mail](email.md#proton-mail). Es speichert deine Anmeldedaten sicher, erzeugt eindeutige E-Mail-Aliase und unterstützt und speichert Passkeys. [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } -[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Dokumentation"} -[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Quellcode" } +[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -240,13 +240,13 @@ Alle Probleme wurden kurz nach dem [Bericht](https://res.cloudinary.com/dbulfrlr
-![1Password Logo](assets/img/password-management/1password.svg){ align=right } +![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** ist ein Passwortmanager mit einem starken Fokus auf Sicherheit und Benutzerfreundlichkeit, der es dir ermöglicht, Passwörter, Schlüssel, Kreditkarten, Softwarelizenzen und andere sensible Informationen in einem sicheren digitalen Tresor zu speichern. Dein Tresor wird auf den Servern von 1Password gegen eine [monatliche Gebühr] (https://1password.com/sign-up) gehostet. 1Password wird regelmäßig [geprüft] (https://support.1password.com/security-assessments) und bietet einen hervorragenden Kundensupport. 1Password ist ein Closed-Source-Produkt; die Sicherheit des Produkts ist jedoch in ihrem [Sicherheits-Whitepaper](https://1passwordstatic.com/files/security/1password-white-paper.pdf) ausführlich dokumentiert. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Dein Tresor wird auf den Servern von 1Password gegen eine [monatliche Gebühr] (https://1password.com/sign-up) gehostet. 1Password wird regelmäßig [geprüft] (https://support.1password.com/security-assessments) und bietet einen hervorragenden Kundensupport. 1Password ist ein Closed-Source-Produkt; die Sicherheit des Produkts ist jedoch in ihrem [Sicherheits-Whitepaper](https://1passwordstatic.com/files/security/1password-white-paper.pdf) ausführlich dokumentiert. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Dokumentation} +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ Alle Probleme wurden kurz nach dem [Bericht](https://res.cloudinary.com/dbulfrlr
-Traditionell bietet 1Password die beste Passwortmanager-Benutzererfahrung für Personen die macOS und iOS verwenden, aber jetzt hat es eine Funktionsparität auf allen Plattformen erreicht. Die Clients von 1Password verfügen über viele Funktionen, die sich an Familien und technisch weniger versierte Personen richten, wie z. B. eine intuitive Benutzeroberfläche für einfache Bedienung und Navigation sowie erweiterte Funktionen. Nahezu jede Funktion von 1Password ist in den nativen mobilen oder Desktop-Clients verfügbar. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. Die Clients von 1Password verfügen über viele Funktionen, die sich an Familien und technisch weniger versierte Personen richten, wie z. B. eine intuitive Benutzeroberfläche für einfache Bedienung und Navigation sowie erweiterte Funktionen. Nahezu jede Funktion von 1Password ist in den nativen mobilen oder Desktop-Clients verfügbar. Dein 1Password-Tresor ist sowohl mit deinem Master-Passwort als auch mit einem zufälligen 34-Zeichen-Sicherheitsschlüssel zur Verschlüsselung deiner Daten auf den Servern von 1Password gesichert. Dieser Sicherheitsschlüssel bietet einen zusätzlichen Schutz für deine Daten, da deine Daten unabhängig von deinem Master-Kennwort mit hoher Entropie gesichert sind. Viele andere Passwortmanager-Lösungen verlassen sich bei der Sicherung deiner Daten ausschließlich auf die Stärke deines Master-Passworts. @@ -279,9 +279,9 @@ Dein 1Password-Tresor ist sowohl mit deinem Master-Passwort als auch mit einem z **Psono** ist ein freier und quelloffener Passwort-Manager aus Deutschland, der sich auf die Passwortverwaltung für Teams konzentriert. Psono unterstützt den sicheren Austausch von Passwörtern, Dateien, Lesezeichen und E-Mails. Alle Geheimnisse sind durch ein Master-Passwort geschützt. [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Dokumentation} -[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Quellcode" } +[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
Downloads @@ -308,7 +308,7 @@ Im April 2024 fügte Psono [Unterstützung für Passkeys](https://psono.com/blog - Muss starke, standardbasierte/moderne E2EE verwenden. - Muss gründlich dokumentierte Verschlüsselungs- und Sicherheitspraktiken haben. -- Es muss ein veröffentlichtes Audit von einem angesehenen, unabhängigen Dritten vorliegen. +- Must have a published audit from a reputable, independent third party. - Alle nicht wesentlichen Telemetriedaten müssen optional sein. - Es dürfen nicht mehr personenbezogene Daten erhoben werden, als für die Rechnungsstellung erforderlich sind. @@ -332,10 +332,10 @@ Mit diesen Optionen kannst du eine verschlüsselte Kennwortdatenbank lokal verwa **KeePassXC** ist ein Community-Fork von KeePassX, einer nativen, plattformübergreifenden Portierung von KeePass Password Safe, mit dem Ziel, es mit neuen Funktionen und Fehlerbehebungen zu erweitern und zu verbessern, um einen funktionsreichen, plattformübergreifenden und modernen Open-Source-Passwortmanager anzubieten. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Spenden } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Mit diesen Optionen kannst du eine verschlüsselte Kennwortdatenbank lokal verwa
-KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org/wiki/Comma-separated_values). Dies kann zu Datenverlusten führen, wenn du diese Datei in einen anderen Passwortmanager importierst. Wir empfehlen dir, jeden Datensatz manuell zu überprüfen. +KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. Wir empfehlen dir, jeden Datensatz manuell zu überprüfen. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org **KeePassDX** ist ein leichtgewichtiger Passwort-Manager für Android; er ermöglicht die Bearbeitung verschlüsselter Daten in einer einzigen Datei im KeePass-Format und kann Formulare auf sichere Weise ausfüllen. Die [Pro-Version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) der App ermöglicht es dir, kosmetische Inhalte und nicht standardmäßige Protokollfunktionen freizuschalten, aber noch wichtiger ist, dass sie die Entwicklung unterstützt und fördert. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Spenden } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -385,10 +385,10 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org **Strongbox** ist ein nativer Passwortmanager für iOS und macOS. Strongbox unterstützt sowohl das KeePass- als auch das Password Safe-Format und kann zusammen mit anderen Passwortmanagern wie KeePassXC auf Nicht-Apple-Plattformen verwendet werden. Durch den Einsatz eines [Freemium-Modells](https://strongboxsafe.com/pricing) bietet Strongbox die meisten Funktionen im Rahmen seines kostenlosen Angebots an, wobei komfortablere [Funktionen](https://strongboxsafe.com/comparison) - wie biometrische Authentifizierung - hinter einem Abonnement oder einer unbefristeten Lizenz verschlossen sind. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Datenschutzrichtlinie" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Mitwirken } +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC speichert seine Exportdaten als [CSV-Dateien](https://en.wikipedia.org -Zusätzlich wird eine reine Offline-Version angeboten: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Diese Version ist abgespeckt, um die Angriffsfläche zu verringern. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Diese Version ist abgespeckt, um die Angriffsfläche zu verringern. ### gopass (CLI) @@ -407,12 +407,12 @@ Zusätzlich wird eine reine Offline-Version angeboten: [Strongbox Zero](https:// ![gopass Logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** ist ein minimaler, in Go geschriebener Passwortmanager für die Kommandozeile. Es kann innerhalb von Skripting-Anwendungen verwendet werden und funktioniert auf allen wichtigen Desktop- und Server-Betriebssystemen (Linux, macOS, BSD, Windows). +**gopass** ist ein minimaler, in Go geschriebener Passwortmanager für die Kommandozeile. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Quellcode" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Spenden } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Zusätzlich wird eine reine Offline-Version angeboten: [Strongbox Zero](https:// - ### Kriterien **Bitte beachte, dass wir mit keinem der Projekte, die wir empfehlen, in Verbindung stehen.** Zusätzlich zu unseren [Standardkriterien](about/criteria.md) haben wir eine Reihe klarer Anforderungen entwickelt, die es uns ermöglichen, objektive Empfehlungen zu geben. Wir empfehlen dir, dich mit der Liste vertraut zu machen, bevor du dich für ein Projekt entscheidest, und deine eigenen Recherchen anzustellen, um sicherzustellen, dass es die richtige Wahl für dich ist. diff --git a/i18n/de/tools.md b/i18n/de/tools.md index 0c0c87f0..e79ac8e9 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/el/assets/img/ios/contact-permissions-dark.png b/i18n/el/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/el/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/el/assets/img/ios/contact-permissions-light.png b/i18n/el/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/el/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/el/assets/img/ios/photo-permissions-dark.png b/i18n/el/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/el/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/el/assets/img/ios/photo-permissions-light.png b/i18n/el/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/el/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/el/assets/img/ios/private-access-dark.png b/i18n/el/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/el/assets/img/ios/private-access-dark.png differ diff --git a/i18n/el/assets/img/ios/private-access-light.png b/i18n/el/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/el/assets/img/ios/private-access-light.png differ diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index 3f6fa4b6..57d0fdf6 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Απόρρητο και ασφάλεια - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/el/os/ios-overview.md b/i18n/el/os/ios-overview.md index fa5de913..f320094b 100644 --- a/i18n/el/os/ios-overview.md +++ b/i18n/el/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index 80fcfcae..f0d1a24c 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Οι προεπιλεγμένοι διαχειριστές κωδικών σε λογισμικά όπως περιηγητές και λειτουργικά συστήματα πολλές φορές δεν μπορούν να ανταγωνιστούν τα εξειδικευμένα λογισμικά διαχείρισης κωδικών. Το πλεονέκτημα ενός προεπιλεγμένου διαχειριστή κωδικών είναι η καλή ενσωμάτωση με το υπόλοιπο λογισμικό, αλλά τείνει να είναι απλοϊκός και να υπολείπεται των χαρακτηριστικών ιδιωτικότητας και ασφάλειας που διαθέτουν οι αυτόνομες εναλλακτικές. +Οι προεπιλεγμένοι διαχειριστές κωδικών σε λογισμικά όπως περιηγητές και λειτουργικά συστήματα πολλές φορές δεν μπορούν να ανταγωνιστούν τα εξειδικευμένα λογισμικά διαχείρισης κωδικών. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Για παράδειγμα, ο διαχειριστής κωδικών του Microsoft Edge δεν προσφέρει καθόλου E2EE. Ο διαχειριστής κωδικών της Google διαθέτει [προαιρετικό](https://support.google.com/accounts/answer/11350823) E2EE, ενώ αυτός [της Apple](https://support.apple.com/HT202303) προσφέρει E2EE από προεπιλογή. @@ -165,7 +165,7 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ schema: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/el/tools.md b/i18n/el/tools.md index f98c2e4a..3747d155 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/eo/assets/img/ios/contact-permissions-dark.png b/i18n/eo/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/eo/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/eo/assets/img/ios/contact-permissions-light.png b/i18n/eo/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/eo/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/eo/assets/img/ios/photo-permissions-dark.png b/i18n/eo/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/eo/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/eo/assets/img/ios/photo-permissions-light.png b/i18n/eo/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/eo/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/eo/assets/img/ios/private-access-dark.png b/i18n/eo/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/eo/assets/img/ios/private-access-dark.png differ diff --git a/i18n/eo/assets/img/ios/private-access-light.png b/i18n/eo/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/eo/assets/img/ios/private-access-light.png differ diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/eo/os/ios-overview.md b/i18n/eo/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/eo/os/ios-overview.md +++ b/i18n/eo/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index 0015122e..b5fe8bfa 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index cfaf4cb2..9b298a10 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/es/assets/img/ios/contact-permissions-dark.png b/i18n/es/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/es/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/es/assets/img/ios/contact-permissions-light.png b/i18n/es/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/es/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/es/assets/img/ios/photo-permissions-dark.png b/i18n/es/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/es/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/es/assets/img/ios/photo-permissions-light.png b/i18n/es/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/es/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/es/assets/img/ios/private-access-dark.png b/i18n/es/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/es/assets/img/ios/private-access-dark.png differ diff --git a/i18n/es/assets/img/ios/private-access-light.png b/i18n/es/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/es/assets/img/ios/private-access-light.png differ diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index df657f4b..ba81f4e8 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -233,7 +233,7 @@ En iOS, cualquier aplicación que puede navegar en internet está [limitada](htt ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** es el navegador predeterminado en iOS. Incluye [funciones de privacidad](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) como [Prevención Inteligente de Rastreo](https://webkit.org/blog/7675/intelligent-tracking-prevention), Informe de Privacidad, pestañas aisladas y efímeras de Navegación Privada, protección de huellas digitales (presentando una versión simplificada de la configuración del sistema a los sitios web para que más dispositivos parezcan idénticos), así como aleatorización de huellas digitales, y Relay Privado para quienes tengan una suscripción de pago a iCloud+. También te permite separar tu navegación con diferentes perfiles y bloquear pestañas privadas con tus datos biométricos/PIN. +**Safari** es el navegador predeterminado en iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Página Principal](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Política de Privacidad" } @@ -247,35 +247,33 @@ En iOS, cualquier aplicación que puede navegar en internet está [limitada](htt Te sugerimos instalar [AdGuard](browser-extensions.md#adguard) si quieres un bloqueador de contenido en Safari. -Las siguientes opciones relacionadas con la privacidad/seguridad pueden encontrarse en :gear: aplicación de **Ajustes** → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Perfiles -Todas tus cookies, historial y datos del sitio web estarán separados para cada perfil. Deberías utilizar diferentes perfiles para diferentes propósitos, por ejemplo, ir de compras, trabajar o uso escolar. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacidad y seguridad -- [x] Activa **Evitar el seguimiento cruzado de sitios** +- [x] Enable **Prevent Cross-Site Tracking** - Esto habilita la [Protección de Seguimiento Inteligente (ITP)](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp) de WebKit. La función ayuda a proteger contra el rastreo no deseado utilizando el aprendizaje automático en el dispositivo para detener a los rastreadores. La ITP protege contra muchas amenazas comunes, pero no bloquea todas las vías de rastreo porque está diseñada para no interferir con la usabilidad del sitio web. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Activa **Requerir Face ID para desbloquear la navegación privada** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - Este ajuste te permite bloquear tus pestañas privadas detrás de los datos biométricos/PIN cuando no las estés utilizando. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Avanzado → Privacidad +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations La configuración de **Protección Avanzada Antirrastreo y de la Huella Digital** aleatorizará ciertos valores para que sea más difícil tomarte las huellas dactilares: - [x] Seleccione **Toda la Navegación** o **Navegación Privada** -#### Informe de privacidad - -El Informe de privacidad proporciona una instantánea de los rastreadores de sitios cruzados a los que actualmente se les impide elaborar perfiles en el sitio web que está visitando. También puede mostrar un informe semanal para mostrar qué rastreadores se han bloqueado a lo largo del tiempo. - -Se puede acceder al Informe de privacidad a través del menú Configuración de la página. - -#### Medición de anuncios para preservar la privacidad +##### Medición de anuncios para preservar la privacidad - [ ] Desactiva **Medición de anuncios para preservar la privacidad** @@ -285,23 +283,23 @@ La función tiene pocos problemas de privacidad por sí misma, así que aunque p #### Navegación privada siempre activa -Abre Safari y pulsa el botón Pestañas, situado en la parte inferior derecha. A continuación, despliegua la lista Grupos de pestañas. +Abre Safari y pulsa el botón Pestañas, situado en la parte inferior derecha. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Selecciona **Privado** El modo de Navegación Privada de Safari ofrece protecciones de privacidad adicionales. La Navegación Privada utiliza una nueva sesión [efímera](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) para cada pestaña, lo que significa que las pestañas están aisladas unas de otras. La Navegación Privada también ofrece otras pequeñas ventajas de privacidad, como no enviar la dirección de una página web a Apple cuando se utiliza la función de traducción de Safari. -Ten en cuenta que la Navegación Privada no guarda cookies ni datos de sitios web, por lo que no podrás permanecer conectado a los sitios. Esto puede ser un inconveniente. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Esto puede ser un inconveniente. #### iCloud Sync La sincronización del historial de Safari, los grupos de pestañas, las pestañas de iCloud y las contraseñas guardadas son E2EE. Sin embargo, por defecto, los marcadores [no](https://support.apple.com/HT202303) lo son. Apple puede descifrarlos y acceder a ellos de acuerdo con su [política de privacidad](https://apple.com/legal/privacy/en-ww). -Puedes activar E2EE para tus favoritos y tus descargas de Safari activando [Protección de Datos Avanzada](https://support.apple.com/HT212520). Vaya a su **Nombre de ID de Apple → iCloud → Protección de datos avanzada**. +Puedes activar E2EE para tus favoritos y tus descargas de Safari activando [Protección de Datos Avanzada](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Activa **Protección de datos avanzada** +- [x] Turn on **Advanced Data Protection** -Si utilizas iCloud con la Protección de Datos Avanzada desactivada, también te recomendamos que compruebes que la ubicación de descarga predeterminada de Safari está configurada como local en tu dispositivo. Esta opción se encuentra en :gear: **Ajustes** → **Safari** → **General** → **Descargas**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criterios diff --git a/i18n/es/os/ios-overview.md b/i18n/es/os/ios-overview.md index 5ebd075c..ff3113cb 100644 --- a/i18n/es/os/ios-overview.md +++ b/i18n/es/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS es un sistema operativo móvil desarrollado por Apple para el i Los dispositivos iOS suelen ser elogiados por los expertos en seguridad por su sólida protección de datos y su adhesión a las mejores prácticas modernas. Sin embargo, el carácter restrictivo del ecosistema de Apple -especialmente con sus dispositivos móviles- sigue obstaculizando la privacidad de varias maneras. -En general, consideramos que iOS ofrece una protección de la privacidad y la seguridad mejor que la media para la mayoría de la gente, en comparación con los dispositivos Android de serie de cualquier fabricante. Sin embargo, puedes alcanzar estándares de privacidad aún más altos con un [sistema operativo Android personalizado](../android/distributions.md#aosp-derivatives) como GrapheneOS, si quieres o necesitas ser completamente independiente de los servicios en la nube de Apple o Google. +En general, consideramos que iOS ofrece una protección de la privacidad y la seguridad mejor que la media para la mayoría de la gente, en comparación con los dispositivos Android de serie de cualquier fabricante. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Bloqueo de Activación @@ -18,7 +18,7 @@ Todos los dispositivos iOS deben ser verificados contra los servidores de bloque ### App Store Obligatoria -La única fuente de aplicaciones en iOS es la App Store de Apple, que requiere un ID de Apple para acceder. Esto significa que Apple tiene un registro de todas las aplicaciones que instalas en tu dispositivo, y es probable que pueda relacionar esa información con tu identidad real si proporcionas a la App Store un método de pago. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Esto significa que Apple tiene un registro de todas las aplicaciones que instalas en tu dispositivo, y es probable que pueda relacionar esa información con tu identidad real si proporcionas a la App Store un método de pago. ### Telemetría Invasiva @@ -28,6 +28,8 @@ Recientemente, se ha descubierto que Apple [transmite datos analíticos incluso ## Configuración Recomendada +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud La mayoría de los problemas de privacidad y seguridad de los productos de Apple están relacionados con sus servicios en la nube, no con su hardware o software. Cuando utilizas servicios de Apple como iCloud, la mayor parte de tu información se almacena en sus servidores y se protege con claves a las que Apple tiene acceso por defecto. Puedes consultar la [documentación de Apple](https://support.apple.com/HT202303) para saber qué servicios están cifrados de extremo a extremo. Todo lo que aparezca como "in transit" o "on server" significa que es posible que Apple acceda a esos datos sin tu permiso. En ocasiones, las fuerzas de seguridad han abusado de este nivel de acceso para eludir el hecho de que tus datos están cifrados de forma segura en tu dispositivo y, por supuesto, Apple es vulnerable a las filtraciones de datos como cualquier otra empresa. @@ -48,7 +50,7 @@ Una suscripción de pago a **iCloud+** (con cualquier plan de almacenamiento de #### Contenido y Compras -En la parte superior de la aplicación **Ajustes**, verás tu nombre y tu foto de perfil si has iniciado sesión con un ID de Apple. Selecciónelo y, a continuación, seleccione **Contenido y compras** > **Ver cuenta**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Desactiva **Recomendaciones Personalizadas** @@ -61,7 +63,7 @@ En la parte superior de la aplicación **Ajustes**, verás tu nombre y tu foto d Tus datos de localización no son E2EE cuando tu dispositivo está conectado y utilizas Buscar iPhone remotamente para localizar tu dispositivo. Tendrá que decidir si estas ventajas compensan los beneficios antirrobo del Bloqueo de Activación. -En la parte superior de la aplicación **Ajustes**, verás tu nombre y tu foto de perfil si has iniciado sesión con un ID de Apple. Selecciónelo y, a continuación, selecciona **Buscar**. Aquí puedes elegir si quieres activar o desactivar las funciones de localización de Buscar. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Selecciónelo y, a continuación, selecciona **Buscar**. Aquí puedes elegir si quieres activar o desactivar las funciones de localización de Buscar. ### Ajustes @@ -73,9 +75,9 @@ Activar el **Modo Avión**, evita que tu teléfono entre en contacto con las tor #### Wi-Fi -Puedes activar la aleatorización de direcciones de hardware para protegerte del rastreo a través de redes Wi-Fi. En la red a la que está conectado actualmente, pulsa el :material-information: botón : +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Activa **Dirección Wi-Fi privada** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** También tienes la opción de **Limitar rastreo de dirección IP**. Esto es similar a iCloud Private Relay pero sólo afecta a las conexiones con "rastreadores conocidos". Dado que sólo afecta a las conexiones con servidores potencialmente maliciosos, probablemente esté bien dejar activada esta opción, pero si no quieres que enrute *ningún* tráfico a través de los servidores de Apple, deberías desactivarla. @@ -85,11 +87,13 @@ También tienes la opción de **Limitar rastreo de dirección IP**. Esto es simi - [ ] Desactiva **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -El nombre de dispositivo de tu iPhone contendrá por defecto tu nombre de pila, y éste será visible para cualquiera en las redes a las que te conectes. Deberías cambiarlo por algo más genérico, como "iPhone". Selecciona **Información** > **Nombre** e introduce el nombre de dispositivo que prefieras. +El nombre de dispositivo de tu iPhone contendrá por defecto tu nombre de pila, y éste será visible para cualquiera en las redes a las que te conectes. Deberías cambiarlo por algo más genérico, como "iPhone". Select **About** → **Name** and enter the device name you prefer. -Es importante instalar con frecuencia **Actualizaciones de Software** para obtener las últimas correcciones de seguridad. Puedes activar **Actualizaciones Automáticas** para mantener tu teléfono al día sin necesidad de buscar actualizaciones constantemente. Selecciona **Actualización de Software** > **Actualizaciones Automáticas**: +Es importante instalar con frecuencia **Actualizaciones de Software** para obtener las últimas correcciones de seguridad. Puedes activar **Actualizaciones Automáticas** para mantener tu teléfono al día sin necesidad de buscar actualizaciones constantemente. Select **Software Update** → **Automatic Updates**: - [x] Activa **Descargar Actualizaciones de iOS** - [x] Activa **Instalar Actualizaciones de iOS** @@ -97,13 +101,13 @@ Es importante instalar con frecuencia **Actualizaciones de Software** para obten **AirDrop** te permite transferir archivos fácilmente, pero puede permitir que extraños te envíen archivos que no deseas. -- [x] Selecciona **AirDrop** > **Recepción Desactivada** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** te permite transmitir sin interrupciones contenidos desde tu iPhone a un televisor; sin embargo, es posible que no siempre quieras hacerlo. Selecciona **AirPlay y Handoff** > **Transmisión por AirPlay Automática**: +**AirPlay** te permite transmitir sin interrupciones contenidos desde tu iPhone a un televisor; sin embargo, es posible que no siempre quieras hacerlo. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Selecciona **Nunca** o **Preguntar** -**Actualización en Segundo Plano** permite que tus aplicaciones actualicen su contenido mientras no las estás utilizando. Esto puede provocar que realicen conexiones no deseadas. Desactivar esta opción también puede ahorrar batería, pero puede afectar a la capacidad de una aplicación para recibir información actualizada, en particular las aplicaciones meteorológicas y de mensajería. +**Actualización en Segundo Plano** permite que tus aplicaciones actualicen su contenido mientras no las estás utilizando. Esto puede provocar que realicen conexiones no deseadas. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Selecciona **Actualización en Segundo Plano** y desactiva las aplicaciones que no quieras que sigan actualizándose en segundo plano. Si no quieres que ninguna aplicación se actualice en segundo plano, puedes volver a seleccionar **Actualización en Segundo Plano** y **desactivarla **. @@ -117,19 +121,19 @@ Si no quieres que nadie pueda controlar tu teléfono con Siri cuando está bloqu Establecer una contraseña segura en tu teléfono es el paso más importante que puedes dar para la seguridad física del dispositivo. Tendrás que elegir entre seguridad y comodidad: Una contraseña más larga será molesta de escribir cada vez, pero una contraseña más corta o un PIN serán más fáciles de adivinar. Configurar Face ID o Touch ID junto con una contraseña segura puede ser un buen compromiso entre usabilidad y seguridad. -Selecciona **Activar Código** o **Cambiar Código** > **Opciones de Código** > **Código Alfanumérico Personalizado**. Asegúrate de crear una [contraseña segura](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Asegúrate de crear una [contraseña segura](../basics/passwords-overview.md). Si deseas utilizar Face ID o Touch ID, puedes seguir adelante y configurarlo ahora. Tu teléfono utilizará la contraseña que configuraste anteriormente como alternativa en caso de que falle la verificación biométrica. Los métodos de desbloqueo biométrico son ante todo una ventaja, aunque impiden que las cámaras de vigilancia o las personas por encima de su hombro te vean introducir el código. Si utilizas datos biométricos, debes saber cómo desactivarlos rápidamente en caso de emergencia. Si mantienes pulsado el botón lateral o de encendido y *o* el botón de volumen hasta que veas el control deslizante para Apagar, se desactivará la biometría y tendrás que introducir el código para desbloquear. El código también será necesario después de reiniciar el dispositivo. -En algunos dispositivos antiguos, puede que tengas que pulsar el botón de encendido cinco veces para desactivar la biometría en su lugar, o para los dispositivos con Touch ID puede que sólo tengas que mantener pulsado el botón de encendido y nada más. Asegúrate de probarlo con antelación para saber qué método funciona con tu dispositivo. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Asegúrate de probarlo con antelación para saber qué método funciona con tu dispositivo. -**Protección en Caso de Robo** es una nueva función de iOS 17.3 que añade seguridad adicional destinada a proteger tus datos personales si te roban el dispositivo mientras está desbloqueado. Si utilizas la biometría y la función Buscar Mi Dispositivo en la configuración de tu ID de Apple, te recomendamos que actives esta nueva protección: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Selecciona **Activar Protección** -Después de activar la Protección en Caso de Robo, [ciertas acciones](https://support.apple.com/HT212510) requerirán autenticación biométrica sin una contraseña de respaldo (en el caso de que un "shoulder surfer" haya obtenido tu PIN), como el uso de autorrelleno de contraseña, el acceso a información de pago y la desactivación del Modo Perdido. También añade un retardo de seguridad a ciertas acciones que se realizan fuera de casa o de otro "lugar conocido", como exigir un temporizador de 1 hora para restablecer la contraseña del ID de Apple o cerrar la sesión del ID de Apple. Este retraso pretende darte tiempo para activar el Modo Perdido y asegurar tu cuenta antes de que un ladrón pueda reiniciar tu dispositivo. +Después de activar la Protección en Caso de Robo, [ciertas acciones](https://support.apple.com/HT212510) requerirán autenticación biométrica sin una contraseña de respaldo (en el caso de que un "shoulder surfer" haya obtenido tu PIN), como el uso de autorrelleno de contraseña, el acceso a información de pago y la desactivación del Modo Perdido. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. Este retraso pretende darte tiempo para activar el Modo Perdido y asegurar tu cuenta antes de que un ladrón pueda reiniciar tu dispositivo. **Permitir Acceso al Estar Bloqueado** te da opciones para lo que puedes permitir cuando tu teléfono está bloqueado. Cuantas más de estas opciones deshabilites, menos podrá hacer alguien sin tu contraseña, pero menos cómodo será para ti. Elige a cuáles de ellos no quieres que alguien tenga acceso si llega a poner sus manos en tu teléfono. @@ -186,6 +190,8 @@ Deberías desactivar los análisis si no deseas enviar datos de uso a Apple. Sel - [ ] Desactiva **Mejorar Fitness++** - [ ] Desactiva **Mejorar Seguridad** - [ ] Desactiva **Mejorar Siri y Dictado** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Desactiva **Anuncios Personalizados** si no quieres anuncios personalizados. Selecciona **Publicidad de Apple**: @@ -203,22 +209,57 @@ Desactiva **Anuncios Personalizados** si no quieres anuncios personalizados. Sel ### Llamadas E2EE -Las llamadas telefónicas normales realizadas con la aplicación Teléfono a través de tu operador no son E2EE. Tanto las llamadas de FaceTime Vídeo como las de FaceTime Audio son E2EE, o puedes usar [otra app](../real-time-communication.md) como Signal. +Las llamadas telefónicas normales realizadas con la aplicación Teléfono a través de tu operador no son E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### iMessage Encriptado + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +Si tú o tu compañero de mensajería tenéis activada la Copia de Seguridad de iCloud sin Protección de Datos Avanzada, la clave de cifrado se almacenará en los servidores de Apple, lo que significa que podrán acceder a tus mensajes. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Ocultar Caras/Información + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Evita el Jailbreaking El jailbreaking en un iPhone socava su seguridad y te hace vulnerable. Ejecutar software de terceros que no sea de confianza podría infectar tu dispositivo con malware. -### iMessage Encriptado - -El color de la burbuja de mensajes en la aplicación Mensajes indica si tus mensajes son E2EE o no. Una burbuja azul indica que estás utilizando iMessage con E2EE, mientras que una burbuja verde indica que la otra parte está utilizando los anticuados protocolos SMS y MMS. Actualmente, la única forma de obtener E2EE en Mensajes es que ambas partes utilicen iMessage en dispositivos Apple. - -Si tú o tu compañero de mensajería tenéis activada la Copia de Seguridad de iCloud sin Protección de Datos Avanzada, la clave de cifrado se almacenará en los servidores de Apple, lo que significa que podrán acceder a tus mensajes. Además, el intercambio de claves de iMessage no es tan seguro como otras implementaciones alternativas, como Signal (que permite ver la clave del destinatario y verificarla mediante un código QR), por lo que no se debería confiar en él para comunicaciones especialmente sensibles. - -### Ocultar Caras/Información - -Si necesitas ocultar información en una foto, puedes utilizar las herramientas integradas de Apple para hacerlo. Abre la foto que quieras editar, pulsa Editar en la esquina superior derecha de la pantalla y, a continuación, pulsa el símbolo de marcado de la parte superior derecha. Pulsa el signo más en la parte inferior derecha de la pantalla y, a continuación, pulsa el icono del rectángulo. Ahora, puede colocar un rectángulo en cualquier lugar de la imagen. Asegúrate de pulsar el icono de forma de la parte inferior izquierda y selecciona el rectángulo relleno. **No** utilices el resaltador para ocultar información, ya que su opacidad no es del 100%. - ### Betas de iOS Apple siempre pone las versiones beta de iOS a disposición de quienes deseen ayudar a encontrar y notificar errores. No recomendamos instalar software beta en tu teléfono. Las versiones beta son potencialmente inestables y podrían tener vulnerabilidades de seguridad no descubiertas. @@ -227,4 +268,4 @@ Apple siempre pone las versiones beta de iOS a disposición de quienes deseen ay ### Antes del Primer Desbloqueo -Si tu modelo de amenazas incluye herramientas forenses y quieres minimizar la posibilidad de que se utilicen exploits para acceder a tu teléfono, debes reiniciar el dispositivo con frecuencia. El estado *después de* un reinicio pero *antes de* desbloquear tu dispositivo se conoce como "Antes del Primer Desbloqueo" (BFU), y cuando tu dispositivo está en ese estado hace que sea [significativamente más difícil](https://belkasoft.com/checkm8_glossary) para las herramientas forenses explotar vulnerabilidades para acceder a tus datos. Este estado BFU te permite recibir notificaciones de llamadas, mensajes de texto y alarmas, pero la mayoría de los datos de tu dispositivo siguen estando encriptados y son inaccesibles. Esto puede ser poco práctico, así que considera si estas soluciones tienen sentido para tu situación. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. El estado *después de* un reinicio pero *antes de* desbloquear tu dispositivo se conoce como "Antes del Primer Desbloqueo" (BFU), y cuando tu dispositivo está en ese estado hace que sea [significativamente más difícil](https://belkasoft.com/checkm8_glossary) para las herramientas forenses explotar vulnerabilidades para acceder a tus datos. Este estado BFU te permite recibir notificaciones de llamadas, mensajes de texto y alarmas, pero la mayoría de los datos de tu dispositivo siguen estando encriptados y son inaccesibles. Esto puede ser poco práctico, así que considera si estas soluciones tienen sentido para tu situación. diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index a592502f..777a646d 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -145,7 +145,7 @@ schema:

Detalles

-Los administradores de contraseñas integrados en programas como navegadores y sistemas operativos a veces no son tan buenos como los programas de administración de contraseñas específicos. La ventaja de un administrador de contraseñas incorporado es una buena integración con el software, pero a menudo puede ser muy simple y carecer de características de privacidad y seguridad que las ofertas independientes tienen. +Los administradores de contraseñas integrados en programas como navegadores y sistemas operativos a veces no son tan buenos como los programas de administración de contraseñas específicos. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Por ejemplo, el administrador de contraseñas de Microsoft Edge no ofrece E2EE. El gestor de contraseñas de Google tiene E2EE [opcional](https://support.google.com/accounts/answer/11350823), y [el de Apple](https://support.apple.com/HT202303) ofrece E2EE por defecto. @@ -163,17 +163,17 @@ Estos administradores de contraseñas sincronizan sus contraseñas con un servid **Bitwarden** es un administrador de contraseñas y passkey gratuito y de código abierto. Su objetivo es resolver los problemas de gestión de contraseñas para individuos, equipos y organizaciones empresariales. Bitwarden es una de las soluciones más fáciles y seguras para almacenar todas sus contraseñas e inicios de sesión manteniéndolos convenientemente sincronizados entre todos sus dispositivos. -[:octicons-home-16: Página Principal](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ El código del lado del servidor de Bitwarden es de [código abierto](https://gi **Vaultwarden** es una implementación alternativa del servidor de sincronización de Bitwarden escrito en Rust y compatible con los clientes oficiales de Bitwarden, perfecto para el despliegue autoalojado donde la ejecución del servicio oficial de recursos pesados podría no ser ideal. Si usted está buscando autoalojar Bitwarden en su propio servidor, es casi seguro que desee utilizar Vaultwarden en lugar del código del servidor oficial de Bitwarden. -[:octicons-repo-16: Repositorio de Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribuir } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -206,10 +206,10 @@ El código del lado del servidor de Bitwarden es de [código abierto](https://gi **Proton Pass** es un administrador de contraseñas cifradas de extremo a extremo y de código abierto desarrollado por Proton, el equipo detrás de [Proton Mail](email.md#proton-mail). Almacena de forma segura sus credenciales de inicio de sesión, genera alias de correo electrónico únicos y admite y almacena claves de acceso. -[:octicons-home-16: Página Principal](https://proton.me/pass){ .md-button .md-button--primary } -[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentación"} -[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } +[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads "Descargas" @@ -242,11 +242,11 @@ Todos los problemas se abordaron y solucionaron poco después del [informe](http ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso, que le permite almacenar contraseñas, claves de acceso, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Tu bóveda se aloja en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up). 1Password es [auditada](https://support.1password.com/security-assessments) con regularidad y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Tu bóveda se aloja en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up). 1Password es [auditada](https://support.1password.com/security-assessments) con regularidad y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Página Principal](https://1password.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads "Descargas" @@ -266,7 +266,7 @@ Todos los problemas se abordaron y solucionaron poco después del [informe](http
-Tradicionalmente, 1Password ha ofrecido la mejor experiencia de usuario entre los administradores de contraseñas para personas que utilizan macOS e iOS; sin embargo, ahora ha logrado la paridad de funciones en todas las plataformas. Los clientes de 1Password cuentan con muchas características orientadas a las familias y a las personas menos técnicas, como una interfaz de usuario intuitiva para facilitar el uso y la navegación, así como funcionalidades avanzadas. En particular, casi todas las funciones de 1Password están disponibles en sus clientes nativos para móvil o escritorio. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. Los clientes de 1Password cuentan con muchas características orientadas a las familias y a las personas menos técnicas, como una interfaz de usuario intuitiva para facilitar el uso y la navegación, así como funcionalidades avanzadas. En particular, casi todas las funciones de 1Password están disponibles en sus clientes nativos para móvil o escritorio. Su bóveda de 1Password está protegida tanto con su contraseña maestra como con una clave de seguridad aleatoria de 34 caracteres para cifrar sus datos en los servidores. Esta clave de seguridad añade una capa de protección a sus datos, ya que estos están asegurados con una alta entropía independientemente de su contraseña maestra. Muchas otras soluciones de administración de contraseñas dependen totalmente de la fortaleza de su contraseña maestra para proteger sus datos. @@ -278,10 +278,10 @@ Su bóveda de 1Password está protegida tanto con su contraseña maestra como co **Psono** es un administrador de contraseñas gratuito y de código abierto alemán, centrado en la gestión de contraseñas para equipos. Psono permite compartir de forma segura contraseñas, archivos, marcadores y correos electrónicos. Todos los secretos están protegidos por una contraseña maestra. -[:octicons-home-16: Página Principal](https://psono.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
Downloads "Descargas" @@ -308,7 +308,7 @@ En abril de 2024, Psono añadió [soporte para passkeys](https://psono.com/blog/ - Debe utilizar E2EE sólido, basado en estándares/moderno. - Debe contar con prácticas de encriptación y seguridad minuciosamente documentadas. -- Debe tener una auditoría publicada de una tercera parte independiente y de buena reputación. +- Must have a published audit from a reputable, independent third party. - Toda telemetría no esencial debe ser opcional. - No debe recopilar más IIP de la necesaria a efectos de facturación. @@ -331,11 +331,11 @@ Estas opciones le permiten administrar una base de datos de contraseñas cifrada **KeePassXC** es una bifurcación comunitaria de KeePassX, un port nativo multiplataforma de KeePass Password Safe, con el objetivo de extenderlo y mejorarlo con nuevas características y correcciones de errores para proporcionar un gestor de contraseñas de código abierto rico en características, multiplataforma y moderno. -[:octicons-home-16: Página Principal](https://keepassxc.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads "Descargas" @@ -351,7 +351,7 @@ Estas opciones le permiten administrar una base de datos de contraseñas cifrada -KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wikipedia.org/wiki/Valores_separados_por_comas). Esto puede significar la pérdida de datos si importa este archivo a otro administrador de contraseñas. Le aconsejamos que compruebe cada registro manualmente. +KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wikipedia.org/wiki/Valores_separados_por_comas). You may encounter data loss if you import this file into another password manager. Le aconsejamos que compruebe cada registro manualmente. ### KeePassDX (Android) @@ -361,10 +361,10 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki **KeePassDX** es un administrador de contraseñas ligero para Android; permite editar datos cifrados en un único archivo en formato KeePass y rellenar formularios de forma segura. La [versión pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) de la aplicación permite desbloquear contenidos cosméticos y funciones de protocolo no estándar, pero lo más importante es que ayuda y fomenta el desarrollo. -[:octicons-home-16: Página Principal](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads "Descargas" @@ -384,11 +384,11 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki **Strongbox** es un gestor de contraseñas nativo para iOS y macOS. Es compatible con los formatos KeePass y Password Safe, por lo que Strongbox puede utilizarse junto con otros administradores de contraseñas, como KeePassXC, en plataformas que no sean Apple. Al emplear un [modelo freemium](https://strongboxsafe.com/pricing), Strongbox ofrece la mayoría de las funciones en su nivel gratuito, mientras que las [funciones](https://strongboxsafe.com/comparison) más orientadas a la comodidad -como la autenticación biométrica- están bloqueadas tras una suscripción o licencia perpetua. -[:octicons-home-16: Página Principal](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads "Descargas" @@ -399,7 +399,7 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki -Además, hay una versión solo sin conexión: [Strongbox Cero](https://apps.apple.com/app/id1581589638). Esta versión tiene solo lo básico para reducir la superficie de ataque. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Esta versión tiene solo lo básico para reducir la superficie de ataque. ### gopass (CLI) @@ -407,12 +407,12 @@ Además, hay una versión solo sin conexión: [Strongbox Cero](https://apps.appl ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** es un gestor de contraseñas mínimo para la línea de comandos escritos en Go. Puede utilizarse dentro de aplicaciones de scripting y funciona en los principales sistemas operativos de escritorio y servidor (Linux, macOS, BSD, Windows). +**gopass** es un gestor de contraseñas mínimo para la línea de comandos escritos en Go. It can be used within scripting applications and works on all major desktop and server operating systems. -[:octicons-home-16: Página Principal](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads "Descargas" @@ -426,7 +426,6 @@ Además, hay una versión solo sin conexión: [Strongbox Cero](https://apps.appl - ### Criterios **Por favor, tenga en cuenta que no estamos afiliados con ninguno de los proyectos que recomendamos.** Además de [nuestros criterios estándar](about/criteria.md), hemos desarrollado un conjunto claro de requisitos que nos permiten ofrecer recomendaciones objetivas. Sugerimos que usted se familiarice con esta lista, antes de decidir utilizar un proyecto y realizar su propia investigación para asegurarse de que es la elección ideal para usted. diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 82331b3d..109e80ec 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -84,7 +84,7 @@ Para obtener más información sobre cada proyecto, por qué han sido elegidos y Recomendamos **Safari** por sus funciones [anti-huella digital](https://webkit.org/blog/15697/private-browsing-2-0/) y el bloqueo de rastreadores por defecto. También separa sus cookies en el modo de navegación privada para evitar el seguimiento entre pestañas. - - [Lea la Reseña Completa :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/fa/assets/img/ios/contact-permissions-dark.png b/i18n/fa/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/fa/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/fa/assets/img/ios/contact-permissions-light.png b/i18n/fa/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/fa/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/fa/assets/img/ios/photo-permissions-dark.png b/i18n/fa/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/fa/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/fa/assets/img/ios/photo-permissions-light.png b/i18n/fa/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/fa/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/fa/assets/img/ios/private-access-dark.png b/i18n/fa/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/fa/assets/img/ios/private-access-dark.png differ diff --git a/i18n/fa/assets/img/ios/private-access-light.png b/i18n/fa/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/fa/assets/img/ios/private-access-light.png differ diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index 21c95593..cd8b3b8d 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### حریم‌خصوصی و امنیت - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/fa/os/ios-overview.md b/i18n/fa/os/ios-overview.md index bba55cc6..df39e7d0 100644 --- a/i18n/fa/os/ios-overview.md +++ b/i18n/fa/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## فایرفاکس Firefox +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index aa493caf..656e2983 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index c19d6407..b57f387c 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/fr/assets/img/ios/contact-permissions-dark.png b/i18n/fr/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/fr/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/fr/assets/img/ios/contact-permissions-light.png b/i18n/fr/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/fr/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/fr/assets/img/ios/photo-permissions-dark.png b/i18n/fr/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/fr/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/fr/assets/img/ios/photo-permissions-light.png b/i18n/fr/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/fr/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/fr/assets/img/ios/private-access-dark.png b/i18n/fr/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/fr/assets/img/ios/private-access-dark.png differ diff --git a/i18n/fr/assets/img/ios/private-access-light.png b/i18n/fr/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/fr/assets/img/ios/private-access-light.png differ diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index 98382a38..d45253d5 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -233,7 +233,7 @@ Sur iOS, toute application capable de naviguer sur le web est [](https://develop ![Logo Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** est le navigateur par défaut dans iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** est le navigateur par défaut dans iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ Sur iOS, toute application capable de naviguer sur le web est [](https://develop We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -Les options suivantes relatives à la vie privée et à la sécurité se trouvent dans l'application :gear: **Réglages** → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profils -Tous vos cookies, votre historique et les données des sites web seront séparés pour chaque profil. Vous devriez utiliser des profils différents pour des objectifs différents, par exemple pour les achats, le travail ou l'école. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Confidentialité & sécurité -- [x] Activer **Empêcher le Pistage Intersite** +- [x] Enable **Prevent Cross-Site Tracking** - Cela active la [Protection Intelligente contre le Pistage](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp) de WebKit. Cette fonction permet de se protéger contre les pistages non désirés en utilisant un apprentissage machine sur l'appareil pour arrêter les traqueurs. ITP protège contre de nombreuses menaces courantes, mais il ne bloque pas toutes les voies de pistage, car il est conçu pour ne pas interférer avec la convivialité des sites Web. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Activer **Exiger Face ID pour déverrouiller la navigation privée** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - Ce paramètre vous permet de verrouiller vos onglets privés derrière des données biométriques/PIN lorsque vous ne les utilisez pas. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Avancé → Confidentialité +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations Le paramètre **Protection avancée contre le suivi et le vol des empreintes** randomise certaines valeurs afin qu'il soit plus difficile de prendre vos empreintes numérique : - [x] Sélectionnez **Toutes les activités de navigation** ou **Navigation privée** -#### Rapport de Confidentialité - -Le Rapport de Confidentialité donne un aperçu des traqueurs intersites qui sont actuellement bloqués sur le site Web que vous visitez et ne peuvent pas vous profiler. Il peut également afficher un rapport hebdomadaire pour montrer quels traqueurs ont été bloqués au fil du temps. - -Le Rapport de Confidentialité est accessible via le menu Paramètres de Page. - -#### Mesure Publicitaire Préservant la vie privée +##### Mesure Publicitaire Préservant la vie privée - [ ] Désactiver **Mesure Publicitaire Préservant la vie privée** @@ -285,23 +283,23 @@ Cette fonction ne pose que peu de problèmes de confidentialité en soi, et mêm #### Navigation Privée Permanente -Ouvrez Safari et appuyez sur le bouton Onglets, situé en bas à droite. Ensuite, développez la liste des Groupes d'Onglets. +Ouvrez Safari et appuyez sur le bouton Onglets, situé en bas à droite. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Sélectionner **Privé** Le mode de Navigation Privée de Safari offre des protections supplémentaires en matière de confidentialité. La Navigation Privée utilise une nouvelle session [éphémère](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) pour chaque onglet, ce qui signifie que les onglets sont isolés les uns des autres. La Navigation Privée présente également d'autres avantages mineurs en matière de protection de la vie privée, comme le fait de ne pas envoyer l'adresse d'une page web à Apple lors de l'utilisation de la fonction de traduction de Safari. -Notez que la Navigation Privée n'enregistre pas les cookies et les données des sites web. Il ne sera donc pas possible de rester connecté aux sites. Cela peut être un inconvénient. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Cela peut être un inconvénient. #### Synchronisation iCloud La synchronisation de l'Historique de Safari, des Groupes d'Onglets, des Onglets iCloud et des mots de passe enregistrés est E2EE. Cependant, par défaut, les favoris ne le sont [pas](https://support.apple.com/HT202303). Apple peut les déchiffrer et y accéder conformément à sa [politique de confidentialité](https://apple.com/legal/privacy/en-ww). -Vous pouvez activer l'E2EE pour vos favoris et vos téléchargements Safari en activant la [Protection avancée des données](https://support.apple.com/HT212520). Accédez à votre **nom d'identifiant Apple → iCloud → Protection avancée des données**. +Vous pouvez activer l'E2EE pour vos favoris et vos téléchargements Safari en activant la [Protection avancée des données](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Activez **Protection avancée des données** +- [x] Turn on **Advanced Data Protection** -Si vous utilisez iCloud avec la Protection avancée des données désactivée, nous vous recommandons également de vérifier que l'emplacement de téléchargement par défaut de Safari est défini sur localement sur votre appareil. Cette option se trouve dans :gear: **Paramètres** → **Safari** → **Général** → **Téléchargements**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Critères diff --git a/i18n/fr/os/ios-overview.md b/i18n/fr/os/ios-overview.md index 6062f654..3ed84cee 100644 --- a/i18n/fr/os/ios-overview.md +++ b/i18n/fr/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS est un système d'exploitation mobile développé par Apple pou iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. Cependant, le caractère restrictif de l'écosystème d'Apple - en particulier avec ses appareils mobiles - continue d'entraver la protection de la vie privée de plusieurs manières. -Nous considérons généralement qu'iOS offre des protections de la vie privée et de la sécurité supérieures à la moyenne pour la plupart des gens, par rapport aux appareils Android d'origine, quel que soit le fabricant. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +Nous considérons généralement qu'iOS offre des protections de la vie privée et de la sécurité supérieures à la moyenne pour la plupart des gens, par rapport aux appareils Android d'origine, quel que soit le fabricant. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Verrouillage d'activation @@ -18,7 +18,7 @@ Tous les appareils iOS doivent être vérifiés sur les serveurs de verrouillage ### App Store obligatoire -La seule source d'applications sur iOS est l'App Store d'Apple, dont l'accès nécessite un identifiant Apple. Cela signifie qu'Apple dispose d'un enregistrement de chaque application que vous installez sur votre appareil et qu'elle peut probablement relier ces informations à votre identité réelle si vous fournissez à l'App Store une méthode de paiement. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Cela signifie qu'Apple dispose d'un enregistrement de chaque application que vous installez sur votre appareil et qu'elle peut probablement relier ces informations à votre identité réelle si vous fournissez à l'App Store une méthode de paiement. ### Télémétrie invasive @@ -28,6 +28,8 @@ Plus récemment, il a été constaté qu'Apple [transmettait des données analyt ## Configuration recommandée +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud La majorité des préoccupations relatives à la protection de la vie privée et à la sécurité des produits Apple sont liées à leurs services cloud, et non à leurs matériels ou à leurs logiciels. Lorsque vous utilisez des services Apple comme iCloud, la plupart de vos informations sont stockées sur leurs serveurs et sécurisées par des clés auxquelles Apple a accès par défaut. Vous pouvez consulter [la documentation d'Apple](https://support.apple.com/HT202303) pour savoir quels services sont chiffrés de bout en bout. Tout ce qui est mentionné comme étant "en transit" ou "sur serveur" signifie qu'il est possible pour Apple d'accéder à ces données sans votre permission. Ce niveau d'accès a parfois été utilisé de manière abusive par les forces de l'ordre pour contourner le fait que vos données sont par ailleurs chiffrées de manière sécurisée sur votre appareil, et bien sûr Apple est vulnérable aux fuites de données comme toute autre entreprise. @@ -48,7 +50,7 @@ Un abonnement payant à **iCloud+** (avec n'importe quelle offre de stockage iCl #### Médias & achats -En haut de l'application **Réglages**, vous verrez votre nom et votre photo de profil si vous êtes connecté à un identifiant Apple. Sélectionnez les, puis sélectionnez **Médias & Achats** > **Voir Compte**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Désactivez **Recommandations Personnalisées** @@ -61,7 +63,7 @@ En haut de l'application **Réglages**, vous verrez votre nom et votre photo de Vos données de localisation ne sont pas E2EE lorsque votre appareil est en ligne et que vous utilisez Localiser mon iPhone à distance pour localiser votre appareil. C'est à vous de décider si ces compromis valent les avantages antivol du verrouillage d'activation. -En haut de l'application **Réglages**, vous verrez votre nom et votre photo de profil si vous êtes connecté à un identifiant Apple. Sélectionnez-les, puis selectionnez **Localiser**. Vous pouvez ici choisir d'activer ou de désactiver les fonctions de Localiser ma position. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Sélectionnez-les, puis selectionnez **Localiser**. Vous pouvez ici choisir d'activer ou de désactiver les fonctions de Localiser ma position. ### Settings @@ -73,9 +75,9 @@ Activation du **mode avion** empêche votre téléphone de contacter les antenne #### Wi-Fi -Vous pouvez activer la randomisation de l'adresse matérielle pour vous protéger contre le pistage des réseaux Wi-Fi. Sur le réseau auquel vous êtes actuellement connecté, appuyez sur le bouton :material-information: : +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Activez **Adresse Wi-Fi privée** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** Vous avez également la possibilité de **Limiter le suivi de l'adresse IP**. Cette fonction est similaire au relais privé iCloud, mais n'affecte que les connexions aux "traqueurs connus". Étant donné qu'il n'affecte que les connexions à des serveurs potentiellement malveillants, vous pouvez probablement laisser ce paramètre activé, mais si vous ne voulez *pas* que le trafic soit acheminé via les serveurs d'Apple, vous devriez le désactiver. @@ -85,11 +87,13 @@ Vous avez également la possibilité de **Limiter le suivi de l'adresse IP**. Ce - [ ] Désactivez **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### Général -Le nom d'appareil de votre iPhone contient par défaut votre prénom, qui sera visible par tous les utilisateurs des réseaux auxquels vous vous connectez. Vous devriez le remplacer par quelque chose de plus générique, comme "iPhone". Sélectionnez **Informations** > **Nom** et saisissez le nom de l'appareil que vous préférez. +Le nom d'appareil de votre iPhone contient par défaut votre prénom, qui sera visible par tous les utilisateurs des réseaux auxquels vous vous connectez. Vous devriez le remplacer par quelque chose de plus générique, comme "iPhone". Select **About** → **Name** and enter the device name you prefer. -Il est important d'installer fréquemment les **mises à jour logicielles** pour bénéficier des derniers correctifs de sécurité. Vous pouvez activer les **mises à jour automatiques** pour maintenir votre téléphone à jour sans avoir à vérifier constamment. Sélectionnez **Mise à jour logicielle** > **MAJ automatiques** : +Il est important d'installer fréquemment les **mises à jour logicielles** pour bénéficier des derniers correctifs de sécurité. Vous pouvez activer les **mises à jour automatiques** pour maintenir votre téléphone à jour sans avoir à vérifier constamment. Select **Software Update** → **Automatic Updates**: - [x] Activez **Télécharger les mises à jour d'iOS** - [x] Activez **Installer les mises à jour d'iOS** @@ -97,13 +101,13 @@ Il est important d'installer fréquemment les **mises à jour logicielles** pour **AirDrop** vous permet de transférer facilement des fichiers, mais il peut permettre à des inconnus de vous envoyer des fichiers que vous ne souhaitez pas. -- [x] Sélectionnez **AirDrop** > **Réception désactivée** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** vous permet de diffuser de manière transparente du contenu de votre iPhone vers un téléviseur, mais vous n'en avez pas toujours besoin. Sélectionnez **AirDrop et Handoff** > **AirPlay automatique vers les téléviseurs** : +**AirPlay** vous permet de diffuser de manière transparente du contenu de votre iPhone vers un téléviseur, mais vous n'en avez pas toujours besoin. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Sélectionnez **Jamais** ou **Demander** -**Actualisation des applications en arrière-plan** permet à vos applications d'actualiser leur contenu lorsque vous ne les utilisez pas. Cela peut les amener à établir des connexions non souhaitées. La désactivation de cette fonction permet également d'économiser la batterie, mais elle peut affecter la capacité d'une application à recevoir des informations actualisées, en particulier les applications de météo et de messagerie. +**Actualisation des applications en arrière-plan** permet à vos applications d'actualiser leur contenu lorsque vous ne les utilisez pas. Cela peut les amener à établir des connexions non souhaitées. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Sélectionnez **Actualisation des applications en arrière-plan** et désactivez toutes les applications que vous ne souhaitez pas voir actualisées en arrière-plan. Si vous ne souhaitez pas qu'une application soit actualisée en arrière-plan, vous pouvez sélectionner à nouveau **Actualisation des applications en arrière-plan** et la **désactiver**. @@ -117,19 +121,19 @@ Si vous ne voulez pas que quelqu'un puisse contrôler votre téléphone avec Sir Définir un mot de passe fort pour votre téléphone est la mesure la plus importante que vous puissiez prendre pour assurer la sécurité physique de votre appareil. Vous devrez faire des compromis entre la sécurité et la commodité : un mot de passe plus long sera fastidieux à saisir à chaque fois, mais un mot de passe ou un code PIN plus court sera plus facile à deviner. Configurer Face ID ou Touch ID avec un mot de passe fort peut être un bon compromis entre convivialité et sécurité. -Sélectionnez **Activer le code d'accès** ou **Modifier le code d'accès** > **Options du code d'accès** > **Code alphanumérique personnalisé**. Veillez à créer un [mot de passe sûr](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Veillez à créer un [mot de passe sûr](../basics/passwords-overview.md). Si vous souhaitez utiliser Face ID ou Touch ID, vous pouvez le configurer maintenant. Votre téléphone utilisera le mot de passe que vous avez défini précédemment comme solution de secours en cas d'échec de la vérification biométrique. Les méthodes de déverrouillage biométrique existent principalement pour la commodité, même si elles empêchent les caméras de surveillance ou les personnes de vous regarder saisir votre code d'accès par-dessus votre épaule. Si vous utilisez les déverouillages biométriques, vous devez savoir comment les désactiver rapidement en cas d'urgence. Maintenir enfoncé le bouton latéral ou le bouton d'alimentation et *l'un* des boutons de volume jusqu'à ce que vous voyiez le curseur Glisser pour éteindre désactivera la biométrie, exigeant votre code d'accès pour déverrouiller. Votre code d'accès sera également requis après le redémarrage de l'appareil. -Sur certains appareils plus anciens, vous devrez peut-être appuyer cinq fois sur le bouton d'alimentation pour désactiver la biométrie ou, pour les appareils dotés de Touch ID, il vous suffira de maintenir le bouton d'alimentation enfoncé, sans rien d'autre. Veillez à faire un essai préalable afin de savoir quelle méthode fonctionne pour votre appareil. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Veillez à faire un essai préalable afin de savoir quelle méthode fonctionne pour votre appareil. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. Si vous utilisez la biométrie et la fonction Localiser dans vos réglages Apple ID, nous vous recommandons d'activer cette nouvelle protection : +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Sélectionnez **Activer la protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. Ce délai a pour but de vous donner le temps d'activer le mode Perdu et de sécuriser votre compte avant qu'un voleur ne puisse réinitialiser votre appareil. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. Ce délai a pour but de vous donner le temps d'activer le mode Perdu et de sécuriser votre compte avant qu'un voleur ne puisse réinitialiser votre appareil. **Autoriser l'accès lorsque le téléphone est verrouillé** vous offre des options pour définir ce que vous pouvez autoriser lorsque votre téléphone est verrouillé. Plus vous désactivez d'options, moins quelqu'un qui n'a pas votre mot de passe peut faire de choses, mais moins c'est pratique pour vous. Choisissez les éléments auxquels vous ne voulez pas que quelqu'un ait accès s'il met la main sur votre téléphone. @@ -186,6 +190,8 @@ Vous devriez désactiver l'analyse si vous ne souhaitez pas envoyer de données - [ ] Désactivez **Améliorer Fitness+** - [ ] Désactivez **Améliorer la sécurité** - [ ] Décochez **Améliorer Siri et Dictée** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Désactivez **Publicités personnalisées** si vous ne voulez pas de publicités ciblées. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-priv ### Appels E2EE -Les appels téléphoniques normaux effectués avec l'application Téléphone par l'intermédiaire de votre opérateur ne sont pas E2EE. Les appels FaceTime Vidéo et FaceTime Audio sont E2EE, ou vous pouvez utiliser [une autre application](../real-time-communication.md) comme Signal. +Les appels téléphoniques normaux effectués avec l'application Téléphone par l'intermédiaire de votre opérateur ne sont pas E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### iMessage chiffré + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +Si vous ou votre partenaire de messagerie avez activé la sauvegarde iCloud sans la protection avancée des données, la clé de chiffrement sera stockée sur les serveurs d'Apple, ce qui signifie qu'ils peuvent accéder à vos messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Caviardage des visages/informations + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Éviter le jailbreaking Le jailbreaking d'un iPhone compromet sa sécurité et vous rend vulnérable. L'exécution de logiciels tiers non fiables peut entraîner l'infection de votre appareil par des logiciels malveillants. -### iMessage chiffré - -La couleur de la bulle de message dans l'application Messages indique si vos messages sont E2EE ou non. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Actuellement, le seul moyen d'obtenir le E2EE dans Messages est que les deux correspondants utilisent iMessage sur des appareils Apple. - -Si vous ou votre partenaire de messagerie avez activé la sauvegarde iCloud sans la protection avancée des données, la clé de chiffrement sera stockée sur les serveurs d'Apple, ce qui signifie qu'ils peuvent accéder à vos messages. En outre, l'échange de clés d'iMessage n'est pas aussi sûr que d'autres implémentations, comme Signal (qui permet de voir la clé du destinataire et de vérifier par QR code), et ne doit donc pas être utilisé pour des communications particulièrement sensibles. - -### Caviardage des visages/informations - -Si vous devez masquer des informations dans une photo, vous pouvez utiliser les outils intégrés d'Apple pour le faire. Ouvrez la photo que vous souhaitez modifier, appuyez sur Modifier dans le coin supérieur droit de l'écran, puis appuyez sur le symbole de marquage en haut à droite. Appuyez sur le plus en bas à droite de l'écran, puis sur l'icône de rectangle. Vous pouvez maintenant placer un rectangle n'importe où sur l'image. Veillez à appuyer sur l'icône de forme en bas à gauche et à sélectionner le rectangle rempli. **N'utilisez pas** le surligneur pour obscurcir des informations, car son opacité n'est pas tout à fait de 100 %. - ### Bêtas iOS Apple met toujours des versions bêta d'iOS à la disposition de ceux qui souhaitent aider à trouver et à signaler des bogues. Nous vous déconseillons d'installer des logiciels bêta sur votre téléphone. Les versions bêta sont potentiellement instables et peuvent présenter des failles de sécurité non découvertes. @@ -227,4 +268,4 @@ Apple met toujours des versions bêta d'iOS à la disposition de ceux qui souhai ### Avant le premier déverrouillage -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. L'état *après* un redémarrage mais *avant* le déverrouillage de votre appareil est appelé "Before First Unlock" (BFU), et lorsque votre appareil est dans cet état, il est [nettement plus difficile](https://belkasoft.com/checkm8_glossary) pour les outils de criminalistique d'exploiter des vulnérabilités pour accéder à vos données. Cet état BFU vous permet de recevoir des notifications pour les appels, les textes et les alarmes, mais la plupart des données de votre appareil sont toujours chiffrées et inaccessibles. Cela peut s'avérer peu pratique, il convient donc de se demander si ces compromis sont judicieux dans votre situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. L'état *après* un redémarrage mais *avant* le déverrouillage de votre appareil est appelé "Before First Unlock" (BFU), et lorsque votre appareil est dans cet état, il est [nettement plus difficile](https://belkasoft.com/checkm8_glossary) pour les outils de criminalistique d'exploiter des vulnérabilités pour accéder à vos données. Cet état BFU vous permet de recevoir des notifications pour les appels, les textes et les alarmes, mais la plupart des données de votre appareil sont toujours chiffrées et inaccessibles. Cela peut s'avérer peu pratique, il convient donc de se demander si ces compromis sont judicieux dans votre situation. diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index b7396d89..e335949f 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -145,7 +145,7 @@ Les **gestionnaires de mots de passe** vous permettent de stocker et de gérer e

Info

-Les gestionnaires de mots de passe intégrés dans des logiciels tels que les navigateurs et les systèmes d'exploitation ne sont parfois pas aussi performants que les logiciels de gestion de mots de passe dédiés. L'avantage d'un gestionnaire de mots de passe intégré est une bonne intégration avec le logiciel, mais il peut souvent être très simpliste et manquer de fonctions de confidentialité et de sécurité dont disposent les offres dissociées. +Les gestionnaires de mots de passe intégrés dans des logiciels tels que les navigateurs et les systèmes d'exploitation ne sont parfois pas aussi performants que les logiciels de gestion de mots de passe dédiés. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Par exemple, le gestionnaire de mots de passe de Microsoft Edge ne propose pas du tout E2EE. Le gestionnaire de mots de passe de Google a un chiffrement de bout en bout [optionnel](https://support.google.com/accounts/answer/11350823?hl=fr), et [celui d'Apple](https://support.apple.com/fr-fr/102651) le propose par défaut. @@ -163,17 +163,17 @@ Ces gestionnaires de mots de passe synchronisent vos mots de passe sur un serveu **Bitwarden** est un gestionnaire de mots de passe et de clés de passe gratuit et open-source. Il vise à résoudre les problèmes de gestion des mots de passe pour les individus, les équipes et les organisations commerciales. Bitwarden est l'une des solutions les plus simples et les plus sûres pour stocker tous vos identifiants et mots de passe tout en les synchronisant de manière pratique entre tous vos appareils. -[:octicons-home-16: Page d'accueil](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Code Source" } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Le code côté serveur de Bitwarden est [open source](https://github.com/bitward **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Si vous cherchez à héberger Bitwarden sur votre propre serveur, vous voudrez certainement utiliser Vaultwarden plutôt que le code serveur officiel de Bitwarden. -[:octicons-repo-16: Dépôt Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Code source" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribuer } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -206,10 +206,10 @@ Le code côté serveur de Bitwarden est [open source](https://github.com/bitward **Proton Pass** is an open-source, end-to-end encrypted password manager developed by Proton, the team behind [Proton Mail](email.md#proton-mail). It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys. -[:octicons-home-16: Page d'accueil](https://proton.me/pass){ .md-button .md-button--primary } -[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Code Source" } +[:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } +[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Votre coffre-fort 1Password est sécurisé à la fois par votre mot de passe principal et par une clé de sécurité aléatoire de 34 caractères pour chiffrer vos données sur leurs serveurs. Cette clé de sécurité ajoute une couche de protection à vos données, car celles-ci sont sécurisées par une entropie élevée, indépendamment de votre mot de passe principal. De nombreuses autres solutions de gestion des mots de passe dépendent entièrement de la force de votre mot de passe principal pour sécuriser vos données. @@ -280,7 +280,7 @@ Votre coffre-fort 1Password est sécurisé à la fois par votre mot de passe pri [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Doit utiliser un système E2EE solide, basé sur des normes et moderne. - Doit avoir des pratiques de chiffrement et de sécurité soigneusement documentées. -- Doit disposer d'un audit publié par une tierce partie indépendante et réputée. +- Must have a published audit from a reputable, independent third party. - Toute télémétrie non essentielle doit être facultative. - Ne doit pas collecter plus de DPI que nécessaire à des fins de facturation. @@ -333,9 +333,9 @@ Ces options vous permettent de gérer une base de données de mots de passe chif [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Ces options vous permettent de gérer une base de données de mots de passe chif -KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Cela peut entraîner une perte de données si vous importez ce fichier dans un autre gestionnaire de mots de passe. Nous vous conseillons de vérifier chaque entrée manuellement. +KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. Nous vous conseillons de vérifier chaque entrée manuellement. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Cette version est dépouillée dans le but de réduire la surface d'attaque. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Cette version est dépouillée dans le but de réduire la surface d'attaque. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Critères **Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** En plus de [nos critères de base](about/criteria.md), nous avons développé un ensemble d'exigences claires pour nous permettre de fournir des recommandations objectives. Nous vous suggérons de vous familiariser avec cette liste avant de choisir d'utiliser un projet, et de mener vos propres recherches pour vous assurer que c'est le bon choix pour vous. diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index bfa65f99..d5ef11f0 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -84,7 +84,7 @@ Pour avoir plus de détails sur chaque projet, pour savoir pourquoi ils ont ét Nous recommandons **Safari** en raison de ses fonctionnalités [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) et de son blocage par défaut des traceurs. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/he/assets/img/ios/contact-permissions-dark.png b/i18n/he/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/he/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/he/assets/img/ios/contact-permissions-light.png b/i18n/he/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/he/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/he/assets/img/ios/photo-permissions-dark.png b/i18n/he/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/he/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/he/assets/img/ios/photo-permissions-light.png b/i18n/he/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/he/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/he/assets/img/ios/private-access-dark.png b/i18n/he/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/he/assets/img/ios/private-access-dark.png differ diff --git a/i18n/he/assets/img/ios/private-access-light.png b/i18n/he/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/he/assets/img/ios/private-access-light.png differ diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index 7496f8bc..ae8b003f 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -233,7 +233,7 @@ Because Mull has more advanced and strict privacy protections enabled by default ![Safari לוגו](assets/img/browsers/safari.svg){ align=right } -**Safari** הוא דפדפן ברירת המחדל ב - iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** הוא דפדפן ברירת המחדל ב - iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ Because Mull has more advanced and strict privacy protections enabled by default We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### פרטיות& אבטחה -- [x] אפשר **מנע מעקב בין אתרים** +- [x] Enable **Prevent Cross-Site Tracking** - זה מאפשר [הגנת מעקב אינטליגנטי](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp) של WebKit. התכונה מסייעת בהגנה מפני מעקב לא רצוי על ידי שימוש בלמידת מכונה במכשיר כדי לעצור עוקבים. ITP מגן מפני איומים נפוצים רבים, אך הוא אינו חוסם את כל אפיקי המעקב מכיוון שהוא נועד לא להפריע לשימושיות האתר. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### דוח פרטיות - -דוח הפרטיות מספק תמונה של עוקבים חוצי אתרים שכרגע מונעים ממך ליצור פרופיל באתר שבו אתה מבקר. הוא יכול גם להציג דוח שבועי כדי להראות אילו עוקבים נחסמו לאורך זמן. - -ניתן לגשת לדוח הפרטיות דרך התפריט 'הגדרות דף '. - -#### שמירת הפרטיות של מדידת המודעות +##### שמירת הפרטיות של מדידת המודעות - [ ] השבת **פרטיות שמירה על מדידת מודעות** @@ -285,23 +283,23 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c #### גלישה פרטית תמיד -פתח את Safari והקש על כפתור הכרטיסיות, הממוקם בפינה השמאלית התחתונה. לאחר מכן, הרחב את רשימת קבוצות הכרטיסיות. +פתח את Safari והקש על כפתור הכרטיסיות, הממוקם בפינה השמאלית התחתונה. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] בחר **פרטי** מצב הגלישה הפרטית של Safari מציע הגנות פרטיות נוספות. גלישה פרטית משתמשת בהפעלה חדשה [>חולפת](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) עבור כל כרטיסייה, כלומר כרטיסיות מבודדות זו מזו. יש גם יתרונות פרטיות קטנים יותר עם גלישה פרטית, כגון אי שליחת כתובת של דף אינטרנט לאפל בעת שימוש בתכונת התרגום של Safari. -שימו לב שגלישה פרטית אינה שומרת קובצי עוגיות ונתוני אתר, כך שלא ניתן יהיה להישאר מחובר לאתרים. זה עשוי להיות אי נוחות. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. זה עשוי להיות אי נוחות. #### iCloud Sync סנכרון של היסטוריית ספארי, קבוצות כרטיסיות, כרטיסיות iCloud וסיסמאות שמורות הם E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). עבור אל **שם Apple ID שלך ← iCloud ← הגנת נתונים מתקדמת**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] הפעל **הגנת נתונים מתקדמת** +- [x] Turn on **Advanced Data Protection** -אם אתה משתמש ב-iCloud עם הגנת נתונים מתקדמת מושבתת, אנו ממליצים גם לבדוק כדי לוודא שמיקום ההורדה המוגדר כברירת מחדל של Safari מוגדר באופן מקומי במכשיר שלך. ניתן למצוא אפשרות זו ב -:gear: **הגדרות** ← **Safari** ← **כללי** ← **הורדות**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## קריטריונים diff --git a/i18n/he/os/ios-overview.md b/i18n/he/os/ios-overview.md index b03e9d9d..f8d6336f 100644 --- a/i18n/he/os/ios-overview.md +++ b/i18n/he/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. עם זאת, ההגבלה של המערכת האקולוגית של אפל - במיוחד עם המכשירים הניידים שלה - עדיין פוגעת בפרטיות במספר דרכים. -בדרך כלל אנו מחשיבים את iOS כמספקת הגנות פרטיות ואבטחה טובות מהממוצע עבור רוב האנשים, בהשוואה למכשירי אנדרואיד במלאי מכל יצרן. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +בדרך כלל אנו מחשיבים את iOS כמספקת הגנות פרטיות ואבטחה טובות מהממוצע עבור רוב האנשים, בהשוואה למכשירי אנדרואיד במלאי מכל יצרן. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### נעילת הפעלה @@ -18,7 +18,7 @@ iOS devices are frequently praised by security experts for their robust data pro ### חנות אפליקציות חובה -המקור היחיד לאפליקציות ב-iOS הוא חנות האפליקציות של אפל, שדורשת מזהה אפל כדי לגשת אליה. משמעות הדבר היא כי לאפל יש תיעוד של כל אפליקציה שאתה מתקין במכשיר שלך, וסביר להניח שהיא יכולה לקשור את המידע הזה לזהותך האמיתית אם תספק ל-App Store אמצעי תשלום. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. משמעות הדבר היא כי לאפל יש תיעוד של כל אפליקציה שאתה מתקין במכשיר שלך, וסביר להניח שהיא יכולה לקשור את המידע הזה לזהותך האמיתית אם תספק ל-App Store אמצעי תשלום. ### טלמטריה פולשנית @@ -28,6 +28,8 @@ iOS devices are frequently praised by security experts for their robust data pro ## תצורה מומלצת +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud רוב דאגות הפרטיות והאבטחה של מוצרי Apple קשורות לשירותי הענן שלהם, לא לחומרה או לתוכנה שלהם. כאשר אתה משתמש בשירותי אפל כמו iCloud, רוב המידע שלך מאוחסן בשרתים שלהם ומאובטח באמצעות מפתחות שאליהם יש לאפל גישה כברירת מחדל. תוכל לעיין ב[תיעוד של אפל](https://support.apple.com/HT202303) לקבלת מידע על השירותים המוצפנים מקצה לקצה. כל דבר המופיע כ"מעבר "או" בשרת "פירושו שאפל ניתן לגשת לנתונים אלה ללא רשותך. מדי פעם נוצלה רמת גישה זו על ידי אכיפת החוק כדי לעקוף את העובדה שהנתונים שלך מוצפנים באופן מאובטח במכשיר שלך, וכמובן שאפל חשופה להפרות נתונים כמו כל חברה אחרת. @@ -48,7 +50,7 @@ iOS devices are frequently praised by security experts for their robust data pro #### מדיה & רכישות -בחלק העליון של האפליקציה **הגדרות**, תראה את שמך ותמונת הפרופיל שלך אם אתה מחובר ל-Apple ID. בחר באפשרות זו, ולאחר מכן בחר **מדיה & רכישות** > **הצג חשבון**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] כבה **המלצות מותאמות אישית** @@ -61,7 +63,7 @@ iOS devices are frequently praised by security experts for their robust data pro נתוני המיקום שלך אינם E2EE כאשר המכשיר שלך מחובר ואתה משתמש ב - Find My iPhone מרחוק כדי לאתר את המכשיר שלך. תצטרך לקבל את ההחלטה אם תמורות אלה שוות את היתרונות נגד גניבה של נעילת הפעלה. -בחלק העליון של האפליקציה **הגדרות**, תראה את שמך ותמונת הפרופיל שלך אם אתה מחובר ל-Apple ID. בחר באפשרות זו, ולאחר מכן בחר **איתור**. כאן באפשרותך לבחור אם להפעיל או להשבית את תכונות המיקום שלי. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. בחר באפשרות זו, ולאחר מכן בחר **איתור**. כאן באפשרותך לבחור אם להפעיל או להשבית את תכונות המיקום שלי. ### Settings @@ -73,9 +75,9 @@ iOS devices are frequently praised by security experts for their robust data pro #### רשת אלחוטית -באפשרותך לאפשר הקצאה אקראית של כתובות חומרה כדי להגן עליך ממעקב אחר רשתות Wi - Fi. ברשת שאליה אתה מחובר כעת, לחץ על לחצן :material-information: : +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] הפעל את **כתובת Wi-Fi פרטית** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** יש לך גם אפשרות **להגביל מעקב אחר כתובות IP**. זה דומה ל - iCloud Private Relay אבל משפיע רק על חיבורים ל"מעקבים ידועים." מכיוון שהיא משפיעה רק על חיבורים לשרתים שעלולים להיות זדוניים, סביר להניח שהגדרה זו תשאיר אותה מופעלת, אך אם אינך מעוניין בכך * כל * תעבורה שתנותב דרך השרתים של אפל, מומלץ לכבות אותה. @@ -85,11 +87,13 @@ iOS devices are frequently praised by security experts for their robust data pro - [ ] כבה את **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### כללי -שם המכשיר של האייפון שלך יכיל כברירת מחדל את שמך הפרטי, וזה יהיה גלוי לכל מי ברשתות שאתה מתחבר אליהן. אתה צריך לשנות את זה למשהו יותר גנרי, כמו "אייפון" בחר **אודות** > **שם** והזן את שם המכשיר המועדף עליך. +שם המכשיר של האייפון שלך יכיל כברירת מחדל את שמך הפרטי, וזה יהיה גלוי לכל מי ברשתות שאתה מתחבר אליהן. אתה צריך לשנות את זה למשהו יותר גנרי, כמו "אייפון" Select **About** → **Name** and enter the device name you prefer. -חשוב להתקין **עדכוני תוכנה** לעיתים קרובות כדי לקבל את תיקוני האבטחה האחרונים. אתה יכול להפעיל את **עדכונים אוטומטיים** כדי לשמור על הטלפון שלך מעודכן מבלי שתצטרך לחפש כל הזמן עדכונים. בחר **עדכון תוכנה** > **עדכונים אוטומטיים**: +חשוב להתקין **עדכוני תוכנה** לעיתים קרובות כדי לקבל את תיקוני האבטחה האחרונים. אתה יכול להפעיל את **עדכונים אוטומטיים** כדי לשמור על הטלפון שלך מעודכן מבלי שתצטרך לחפש כל הזמן עדכונים. Select **Software Update** → **Automatic Updates**: - [x] הפעל את **הורד עדכוני iOS** - [x] הפעל את **התקן עדכוני iOS** @@ -97,13 +101,13 @@ iOS devices are frequently praised by security experts for their robust data pro **AirDrop** מאפשר לך להעביר קבצים בקלות, אך הוא יכול לאפשר לזרים לשלוח לך קבצים שאינך רוצה. -- [x] בחר **AirDrop** > **קבלה כבויה** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** מאפשר לך להזרים בצורה חלקה תוכן מה-iPhone שלך לטלוויזיה; עם זאת, ייתכן שלא תמיד תרצה בכך. בחר **AirPlay & מסירה** > **AirPlay אוטומטית לטלוויזיות**: +**AirPlay** מאפשר לך להזרים בצורה חלקה תוכן מה-iPhone שלך לטלוויזיה; עם זאת, ייתכן שלא תמיד תרצה בכך. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] בחר **לעולם לא** או **שאל** -**רענון אפליקציות ברקע** מאפשר ליישומים שלך לרענן את התוכן שלהם בזמן שאינך משתמש בהם. זה עלול לגרום להם ליצור קשרים לא רצויים. כיבוי זה יכול גם לחסוך בחיי סוללה, אבל זה עשוי להשפיע על היכולת של אפליקציה לקבל מידע מעודכן, במיוחד אפליקציות מזג אוויר והודעות. +**רענון אפליקציות ברקע** מאפשר ליישומים שלך לרענן את התוכן שלהם בזמן שאינך משתמש בהם. זה עלול לגרום להם ליצור קשרים לא רצויים. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. בחר **רענון אפליקציות ברקע** וכבה את כל האפליקציות שאינך רוצה להמשיך לרענן ברקע. אם אינך רוצה שאפליקציות כלשהן ירעננו ברקע, תוכל לבחור שוב ב**רענון אפליקציה ברקע** ולכבות **אותה**. @@ -117,19 +121,19 @@ iOS devices are frequently praised by security experts for their robust data pro הגדרת סיסמה חזקה בטלפון שלך היא הצעד החשוב ביותר שאתה יכול לנקוט לאבטחת המכשיר הפיזי. תצטרך לעשות כאן פשרה בין אבטחה לנוחות: סיסמה ארוכה יותר תהיה מעצבנת להזין בכל פעם, אבל סיסמה קצרה יותר או PIN יהיה קל יותר לנחש. הגדרת Face ID או Touch ID יחד עם סיסמה חזקה יכולה להיות פשרה טובה בין שימושיות ואבטחה. -בחר **הפעל קוד גישה** או **שנה קוד גישה** > **אפשרויות קוד סיסמה** > **קוד אלפאנומרי מותאם אישית**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). אם ברצונך להשתמש ב-Face ID או Touch ID, תוכל להמשיך ולהגדיר זאת כעת. הטלפון שלך ישתמש בסיסמה שהגדרת קודם לכן כחלופה למקרה שהאימות הביומטרי שלך ייכשל. שיטות פתיחה ביומטריות הן בעיקר נוחות, אם כי הן עוצרות מצלמות מעקב או אנשים מעבר לכתף שלך מלצפות בך מזין את קוד הסיסמה שלך. אם אתה משתמש ביומטרי, אתה צריך לדעת איך לכבות אותם במהירות במקרה חירום. לחיצה ממושכת על לחצן הצד או ההפעלה ו*כל אחד* כפתור עוצמת הקול עד שתראה את המחוון Slide to Power Off תשבית את הביומטרי, ותחייב את קוד הגישה שלך כדי לפתוח. קוד הגישה שלך יידרש גם לאחר הפעלה מחדש של המכשיר. -בחלק מהמכשירים הישנים יותר, ייתכן שתצטרך ללחוץ על כפתור ההפעלה חמש פעמים כדי להשבית את הביומטרי במקום זאת, או עבור מכשירים עם Touch ID ייתכן שתצטרך ללחוץ על כפתור ההפעלה ותו לא. הקפד לנסות זאת מראש כדי שתדע איזו שיטה עובדת עבור המכשיר שלך. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. הקפד לנסות זאת מראש כדי שתדע איזו שיטה עובדת עבור המכשיר שלך. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **אפשר גישה כאשר הוא נעול** נותן לך אפשרויות למה שאתה יכול לאפשר כשהטלפון שלך נעול. ככל שתבטל יותר מהאפשרויות האלה, כך מישהו ללא הסיסמה שלך יכול לעשות פחות, אבל זה יהיה פחות נוח עבורך. תברר ובחר לאילו מבין אלה אינך רוצה שלמישהו תהיה גישה אם הוא ישים את ידו על הטלפון שלך. @@ -186,6 +190,8 @@ This is disabled by default and cannot be changed for users under 18. - [ ] כבה את **שיפור כושר+** - [ ] כבה את **שפר את הבטיחות** - [ ] כבה את **שפר את Siri & הכתבה** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** השבת את **מודעות מותאמות אישית** אם אינך מעוניין במודעות ממוקדות. Select **Apple Advertising**: @@ -203,22 +209,57 @@ This is disabled by default and cannot be changed for users under 18. ### שיחות E2EE -שיחות טלפון רגילות שנעשות באמצעות אפליקציית הטלפון דרך הספק שלך אינן E2EE. גם שיחות FaceTime Video ו-FaceTime Audio הן E2EE, או שאתה יכול להשתמש ב[אפליקציה אחרת](../real-time-communication.md) כמו Signal. +שיחות טלפון רגילות שנעשות באמצעות אפליקציית הטלפון דרך הספק שלך אינן E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Imessage מוצפן + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +אם אתה או שותף ההודעות שלך הפעלת גיבוי iCloud ללא הגנת נתונים מתקדמת, מפתח ההצפנה יאוחסן בשרתים של אפל, כלומר הם יכולים לגשת להודעות שלך. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### השחרת פנים/מידע + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### הימנע מפריצת Jailbreak פריצת Jailbreaking של אייפון מערערת את האבטחה שלו והופכת אותך לפגיע. הפעלת תוכנת צד שלישי לא מהימנה עלולה לגרום למכשיר שלך להידבק בתוכנה זדונית. -### Imessage מוצפן - -צבע בועת ההודעה באפליקציית ההודעות מציין אם ההודעות שלך הן E2EE או לא. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. נכון לעכשיו, הדרך היחידה להשיג E2EE בהודעות היא ששני הצדדים ישתמשו ב-iMessage במכשירי אפל. - -אם אתה או שותף ההודעות שלך הפעלת גיבוי iCloud ללא הגנת נתונים מתקדמת, מפתח ההצפנה יאוחסן בשרתים של אפל, כלומר הם יכולים לגשת להודעות שלך. בנוסף, החלפת המפתחות של iMessage אינה מאובטחת כמו יישומים אלטרנטיביים, כמו Signal (המאפשר לך להציג את מפתח הנמענים ולאמת באמצעות קוד QR), כך שאין להסתמך עליה עבור תקשורת רגישה במיוחד. - -### השחרת פנים/מידע - -אם אתה צריך להסתיר מידע בתמונה, אתה יכול להשתמש בכלים המובנים של אפל כדי לעשות זאת. פתח את התמונה שברצונך לערוך, לחץ על ערוך בפינה השמאלית העליונה של המסך, ולאחר מכן לחץ על סמל הסימון בפינה השמאלית העליונה. לחץ על הפלוס בפינה השמאלית התחתונה של המסך, ולאחר מכן לחץ על סמל המלבן. כעת, אתה יכול למקם מלבן בכל מקום בתמונה. הקפד ללחוץ על סמל הצורה בפינה השמאלית התחתונה ובחר את המלבן המלא. **אל** תשתמש במדגיש כדי לטשטש מידע, מכיוון שהאטימות שלו לא ממש 100%. - ### iOS בטא אפל תמיד הופכת גרסאות בטא של iOS לזמינות מוקדם עבור אלה שרוצים לעזור למצוא ולדווח על באגים. אנו לא ממליצים להתקין תוכנת בטא בטלפון שלך. גרסאות בטא עלולות להיות לא יציבות ויכולות להכיל פרצות אבטחה שלא התגלו. @@ -227,4 +268,4 @@ This is disabled by default and cannot be changed for users under 18. ### לפני הפתיחה הראשונה -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. המצב *אחרי* אתחול מחדש אך *לפני* ביטול נעילת המכשיר שלך מכונה "לפני ביטול נעילה ראשון" (BFU), וכאשר המכשיר שלך נמצא במצב זה, זה מקשה [באופן משמעותי](https://belkasoft.com/checkm8_glossary) עבור כלים משפטיים לנצל נקודות תורפה כדי לגשת לנתונים שלך. מצב BFU זה מאפשר לך לקבל התראות על שיחות, הודעות טקסט והתראות, אך רוב הנתונים במכשיר שלך עדיין מוצפנים ואינם נגישים. זה יכול להיות לא מעשי, אז שקול אם הפשרות האלה הגיוניות למצב שלך. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. המצב *אחרי* אתחול מחדש אך *לפני* ביטול נעילת המכשיר שלך מכונה "לפני ביטול נעילה ראשון" (BFU), וכאשר המכשיר שלך נמצא במצב זה, זה מקשה [באופן משמעותי](https://belkasoft.com/checkm8_glossary) עבור כלים משפטיים לנצל נקודות תורפה כדי לגשת לנתונים שלך. מצב BFU זה מאפשר לך לקבל התראות על שיחות, הודעות טקסט והתראות, אך רוב הנתונים במכשיר שלך עדיין מוצפנים ואינם נגישים. זה יכול להיות לא מעשי, אז שקול אם הפשרות האלה הגיוניות למצב שלך. diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index 9bde3cd4..5c27b527 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -22,7 +22,7 @@ schema: - ווינדוס - macOS - לינוקס - - אנדרואיד + - Android - iOS subjectOf: "@context": http://schema.org @@ -40,7 +40,7 @@ schema: - ווינדוס - macOS - לינוקס - - אנדרואיד + - Android - iOS subjectOf: "@context": http://schema.org @@ -54,7 +54,7 @@ schema: url: https://proton.me/pass applicationCategory: מנהל הסיסמאות operatingSystem: - - אנדרואיד + - Android - iOS subjectOf: "@context": http://schema.org @@ -68,7 +68,7 @@ schema: url: https://psono.com applicationCategory: מנהל הסיסמאות operatingSystem: - - אנדרואיד + - Android - iOS subjectOf: "@context": http://schema.org @@ -97,7 +97,7 @@ schema: image: /assets/img/password-management/keepassdx.svg url: https://keepassdx.com applicationCategory: מנהל הסיסמאות - operatingSystem: אנדרואיד + operatingSystem: Android subjectOf: "@context": http://schema.org "@type": WebPage @@ -145,7 +145,7 @@ schema:

Info

-מנהלי סיסמאות מובנים בתוכנות כמו דפדפנים ומערכות הפעלה אינם טובים לפעמים כמו תוכנות ייעודיות למנהל סיסמאות. היתרון של מנהל סיסמאות מובנה הוא אינטגרציה טובה עם התוכנה, אך לרוב זה יכול להיות פשוט מאוד וחסר תכונות פרטיות ואבטחה שיש להצעות עצמאיות. +מנהלי סיסמאות מובנים בתוכנות כמו דפדפנים ומערכות הפעלה אינם טובים לפעמים כמו תוכנות ייעודיות למנהל סיסמאות. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. לדוגמה, מנהל הסיסמאות ב-Microsoft Edge אינו מציע E2EE כלל. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ schema: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. אם אתם מחפשים לארח את Bitwarden באופן עצמאי בשרת שלכם, קרוב לוודאי שתרצו להשתמש ב-Vaultwarden על פני קוד השרת הרשמי של Bitwarden. -[:octicons-repo-16: Vaultwarden מאגר](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=לתרומה } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. כספת 1Password שלך מאובטחת גם עם סיסמת האב שלך וגם עם מפתח אבטחה אקראי בן 34 תווים כדי להצפין את הנתונים שלך בשרתים שלהם. מפתח אבטחה זה מוסיף שכבת הגנה לנתונים שלך מכיוון שהנתונים שלך מאובטחים באנטרופיה גבוהה ללא קשר לסיסמת המאסטר שלך. פתרונות רבים אחרים של מנהל סיסמאות תלויים לחלוטין בחוזקה של סיסמת המאסטר שלך כדי לאבטח את הנתונים שלך. @@ -280,7 +280,7 @@ Traditionally, 1Password has offered the best password manager user experience f [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - חייב להשתמש ב-E2EE חזק, מבוסס תקנים/מודרני. - חייב להיות מתועד ביסודיות נוהלי הצפנה ואבטחה. -- חייב להיות ביקורת שפורסמה מצד שלישי מכובד ובלתי תלוי. +- Must have a published audit from a reputable, independent third party. - כל טלמטריה לא חיונית חייבת להיות אופציונלית. - אסור לאסוף יותר PII ממה שנדרש למטרות חיוב. @@ -333,9 +333,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i -KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). המשמעות עשויה להיות אובדן נתונים אם אתה מייבא קובץ זה למנהל סיסמאות אחר. אנו ממליצים לך לבדוק כל רשומה באופן ידני. +KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. אנו ממליצים לך לבדוק כל רשומה באופן ידני. ### KeePassDX (אנדרואיד) @@ -362,9 +362,9 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). גרסה זו מופשטת בניסיון לצמצם את שטח התקיפה. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). גרסה זו מופשטת בניסיון לצמצם את שטח התקיפה. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### קריטריונים **שימו לב שאיננו קשורים לאף אחד מהפרויקטים שאנו ממליצים עליהם.** בנוסף ל[קריטריונים הסטנדרטיים שלנו](about/criteria.md), פיתחנו מערכת ברורה של דרישות כדי לאפשר לנו לספק המלצות אובייקטיביות. אנו מציעים לך להכיר את הרשימה הזו לפני שתבחר להשתמש בפרויקט, ולערוך מחקר משלך כדי להבטיח שזו הבחירה הנכונה עבורך. diff --git a/i18n/he/tools.md b/i18n/he/tools.md index 04abe65a..fc8b8d23 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -84,7 +84,7 @@ If you want assistance figuring out the best privacy tools and alternative progr We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/hi/assets/img/ios/contact-permissions-dark.png b/i18n/hi/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/hi/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/hi/assets/img/ios/contact-permissions-light.png b/i18n/hi/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/hi/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/hi/assets/img/ios/photo-permissions-dark.png b/i18n/hi/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/hi/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/hi/assets/img/ios/photo-permissions-light.png b/i18n/hi/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/hi/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/hi/assets/img/ios/private-access-dark.png b/i18n/hi/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/hi/assets/img/ios/private-access-dark.png differ diff --git a/i18n/hi/assets/img/ios/private-access-light.png b/i18n/hi/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/hi/assets/img/ios/private-access-light.png differ diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/hi/os/ios-overview.md b/i18n/hi/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/hi/os/ios-overview.md +++ b/i18n/hi/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index aa493caf..656e2983 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index cfaf4cb2..9b298a10 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/hu/assets/img/ios/contact-permissions-dark.png b/i18n/hu/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/hu/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/hu/assets/img/ios/contact-permissions-light.png b/i18n/hu/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/hu/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/hu/assets/img/ios/photo-permissions-dark.png b/i18n/hu/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/hu/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/hu/assets/img/ios/photo-permissions-light.png b/i18n/hu/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/hu/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/hu/assets/img/ios/private-access-dark.png b/i18n/hu/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/hu/assets/img/ios/private-access-dark.png differ diff --git a/i18n/hu/assets/img/ios/private-access-light.png b/i18n/hu/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/hu/assets/img/ios/private-access-light.png differ diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index 21c86574..2f7dd1d6 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Követelmények diff --git a/i18n/hu/os/ios-overview.md b/i18n/hu/os/ios-overview.md index 1dd65551..98340af9 100644 --- a/i18n/hu/os/ios-overview.md +++ b/i18n/hu/os/ios-overview.md @@ -10,7 +10,7 @@ Az **iOS** és az **iPadOS** az Apple által az iPhone és az iPad termékekhez iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. Azonban az Apple zárt ökoszisztémájának korlátozó volta – különösen a mobil eszközök esetében – továbbra is számos módon hátráltatja a magánélet védelmét. -Általánosságban úgy véljük, hogy az iOS a legtöbb ember számára az átlagosnál jobb adatvédelmi és biztonsági védelmet nyújt, mint a bármelyik gyártótól származó Android készülékek. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +Általánosságban úgy véljük, hogy az iOS a legtöbb ember számára az átlagosnál jobb adatvédelmi és biztonsági védelmet nyújt, mint a bármelyik gyártótól származó Android készülékek. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Aktiválási zár @@ -18,7 +18,7 @@ Minden iOS-eszközt le kell ellenőrizni az Apple Activation Lock szerverein, am ### Kötelező App Store -Az iOS-en az alkalmazások egyetlen forrása az Apple App Store, amelyhez Apple ID szükséges. Ez azt jelenti, hogy az Apple nyilvántartást vezet minden egyes alkalmazásról, amelyet telepítesz a készülékedre, és valószínűleg össze tudja kapcsolni ezeket az információkat a tényleges személyazonosságoddal, ha megadsz egy fizetési módot az App Store-nak. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Ez azt jelenti, hogy az Apple nyilvántartást vezet minden egyes alkalmazásról, amelyet telepítesz a készülékedre, és valószínűleg össze tudja kapcsolni ezeket az információkat a tényleges személyazonosságoddal, ha megadsz egy fizetési módot az App Store-nak. ### Invazív telemetria @@ -28,6 +28,8 @@ A közelmúltban kiderült, hogy az Apple [még akkor is továbbítja az analiti ## Ajánlott konfiguráció +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud Az Apple termékeivel kapcsolatos adatvédelmi és biztonsági aggályok többsége a felhőszolgáltatásokkal kapcsolatos, nem pedig a hardverrel vagy szoftverrel. Amikor az Apple szolgáltatásait, például az iCloudot használod, a legtöbb adatodat a szervereiken tárolják, és olyan kulcsokkal védik, amelyekhez az Apple alapértelmezés szerint hozzáfér. Az [Apple dokumentációjában](https://support.apple.com/HT202303) tájékozódhatsz arról, hogy mely szolgáltatások végponttól végpontig titkosítottak. Bármi, ami "átvitel alatt", vagy a "szerveren" van, azt jelenti, hogy az Apple hozzáférhet ezekhez az adatokhoz a te engedélyed nélkül. A bűnüldöző szervek időnként visszaéltek ezzel a hozzáférési szinttel, hogy megkerüljék azt a tényt, hogy a felhasználói adatok egyébként biztonságosan titkosítva vannak az eszközön, valamint természetesen az Apple is ugyanúgy ki van téve az adatvédelmi incidenseknek, mint bármely más vállalat. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ A **Lokátor** egy olyan szolgáltatás, amellyel nyomon követheted Apple-eszk Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ A **repülőgépes üzemmód** engedélyezése megakadályozza, hogy a telefon k #### Wi-Fi -A Wi-Fi hálózatokon keresztüli nyomon követés elleni védelem érdekében engedélyezheted a hardvercímek véletlenszerűségét. Az aktuálisan csatlakoztatott hálózatk megtekintéséhez kattints a :material-information: gombra: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] **Privát Wi-Fi cím** bekapcsolása +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** Lehetőséged van az **IP-címek nyomon követésének korlátozására** is. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ Lehetőséged van az **IP-címek nyomon követésének korlátozására** is. Th - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### Végponttól-végpontig titkosított hívások -A telefonszolgáltatón keresztül a Telefon alkalmazással kezdeményezett normál telefonhívások nincsenek végponttól-végpontig titkosítással védve. A FaceTime Video éw a FaceTime Audio hívások végponttól-végpontig titkosítottak, de használhatsz helyettük [egy másik alkalmazást](../real-time-communication.md), például a Signal-t. +A telefonszolgáltatón keresztül a Telefon alkalmazással kezdeményezett normál telefonhívások nincsenek végponttól-végpontig titkosítással védve. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Titkosított iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Arcok/információk elsötétítése + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Az iPhone jailbreakelése aláássa a biztonságot, és sebezhetővé tesz téged. A nem megbízható, harmadik féltől származó szoftverek futtatása rosszindulatú szoftverekkel fertőzheti meg a készülékedet. -### Titkosított iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Arcok/információk elsötétítése - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS béták Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Az első feloldás előtt -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index d604b382..401be91f 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Követelmények **Tartsd figyelemben, hogy nem állunk kapcsolatban az általunk ajánlott projektek egyikével sem.** Az [alap kritériumaink mellett](about/criteria.md), egyértelmű követelményrendszert dolgoztunk ki, hogy objektív ajánlásokat tudjunk tenni. Javasoljuk, hogy ismerkedj meg ezzel a listával, mielőtt kiválasztanál egy projektet, és végezz saját kutatásokat, hogy megbizonyosodj arról, hogy ez a megfelelő választás számodra. diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index 7cb10634..5874b2f7 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -84,7 +84,7 @@ Ha további információt szeretnél megtudni az egyes projektekről, hogy miér We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/id/assets/img/ios/contact-permissions-dark.png b/i18n/id/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/id/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/id/assets/img/ios/contact-permissions-light.png b/i18n/id/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/id/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/id/assets/img/ios/photo-permissions-dark.png b/i18n/id/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/id/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/id/assets/img/ios/photo-permissions-light.png b/i18n/id/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/id/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/id/assets/img/ios/private-access-dark.png b/i18n/id/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/id/assets/img/ios/private-access-dark.png differ diff --git a/i18n/id/assets/img/ios/private-access-light.png b/i18n/id/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/id/assets/img/ios/private-access-light.png differ diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index f3a3a8d4..9bda69a5 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Kriteria diff --git a/i18n/id/os/ios-overview.md b/i18n/id/os/ios-overview.md index 15d18b76..55bec454 100644 --- a/i18n/id/os/ios-overview.md +++ b/i18n/id/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Konfigurasi yang Disarankan +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index 76eca1b3..5924684c 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Pengelola kata sandi bawaan pada perangkat lunak seperti peramban dan sistem operasi terkadang tidak sebaik perangkat lunak pengelola kata sandi khusus. Keuntungan dari pengelola kata sandi bawaan adalah integrasi yang baik dengan perangkat lunak, tetapi sering kali sangat sederhana dan tidak memiliki fitur privasi dan keamanan seperti yang dimiliki oleh penawaran mandiri. +Pengelola kata sandi bawaan pada perangkat lunak seperti peramban dan sistem operasi terkadang tidak sebaik perangkat lunak pengelola kata sandi khusus. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Sebagai contoh, pengelola kata sandi di Microsoft Edge sama sekali tidak menawarkan E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Pengelola kata sandi ini menyinkronkan kata sandi Anda ke server cloud untuk kem [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Pengelola kata sandi ini menyinkronkan kata sandi Anda ke server cloud untuk kem - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Kode sisi server Bitwarden [bersumber terbuka](https://github.com/bitwarden/serv **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Jika Anda ingin meng-host Bitwarden di server Anda sendiri, Gunakanlah Vaultwarden dan bukan kode server resmi Bitwarden. -[:octicons-repo-16: Repositori Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Kontribusi } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Kode sisi server Bitwarden [bersumber terbuka](https://github.com/bitwarden/serv [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Brankas 1Password Anda diamankan dengan kata sandi utama dan kunci keamanan 34 karakter yang diacak untuk mengenkripsi data Anda di server mereka. Kunci keamanan ini menambahkan lapisan perlindungan pada data Anda karena data Anda diamankan dengan entropi yang tinggi terlepas dari kata sandi utama Anda. Banyak solusi pengelola kata sandi lainnya yang sepenuhnya bergantung pada kekuatan kata sandi utama Anda untuk mengamankan data Anda. @@ -280,7 +280,7 @@ Brankas 1Password Anda diamankan dengan kata sandi utama dan kunci keamanan 34 k [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Harus menggunakan E2EE yang kuat, berbasis standar/modern. - Harus memiliki praktik enkripsi dan keamanan yang terdokumentasi secara menyeluruh. -- Harus memiliki audit yang dipublikasikan dari pihak ketiga yang memiliki reputasi baik dan independen. +- Must have a published audit from a reputable, independent third party. - Semua telemetri yang tidak penting harus bersifat opsional. - Tidak boleh mengumpulkan PII lebih banyak daripada yang diperlukan untuk tujuan penagihan. @@ -333,9 +333,9 @@ Opsi ini memungkinkan Anda untuk mengelola basis data kata sandi terenkripsi sec [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Opsi ini memungkinkan Anda untuk mengelola basis data kata sandi terenkripsi sec -KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Hal ini dapat menyebabkan hilangnya data jika Anda mengimpor file ini ke pengelola kata sandi lain. Kami menyarankan Anda memeriksa setiap catatan secara manual. +KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. Kami menyarankan Anda memeriksa setiap catatan secara manual. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Versi ini sudah diminimalkan dalam upaya untuk mengurangi permukaan serangan. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Versi ini sudah diminimalkan dalam upaya untuk mengurangi permukaan serangan. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Kriteria **Harap diperhatikan bahwa kami tidak berafiliasi dengan proyek-proyek yang kami rekomendasikan.** Selain [kriteria standar kami](about/criteria.md), kami telah mengembangkan serangkaian persyaratan yang jelas untuk memungkinkan kami memberikan rekomendasi yang objektif. Kami sarankan Anda membiasakan diri dengan daftar ini sebelum memilih untuk menggunakan sebuah proyek, dan melakukan penelitian sendiri untuk memastikan bahwa itu adalah pilihan yang tepat untuk Anda. diff --git a/i18n/id/tools.md b/i18n/id/tools.md index 5f94ed60..eb7b2679 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -84,7 +84,7 @@ Untuk detail lebih lanjut tentang setiap proyek, mengapa proyek tersebut dipilih We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/it/assets/img/ios/contact-permissions-dark.png b/i18n/it/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/it/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/it/assets/img/ios/contact-permissions-light.png b/i18n/it/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/it/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/it/assets/img/ios/photo-permissions-dark.png b/i18n/it/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/it/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/it/assets/img/ios/photo-permissions-light.png b/i18n/it/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/it/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/it/assets/img/ios/private-access-dark.png b/i18n/it/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/it/assets/img/ios/private-access-dark.png differ diff --git a/i18n/it/assets/img/ios/private-access-light.png b/i18n/it/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/it/assets/img/ios/private-access-light.png differ diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index ee97eb60..e6dd0859 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -233,7 +233,7 @@ Su iOS, qualsiasi app che possa navigare sul web è [limitata](https://developer ![Logo di Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** è il browser predefinito di iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** è il browser predefinito di iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ Su iOS, qualsiasi app che possa navigare sul web è [limitata](https://developer We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -Le seguenti opzioni, relative alla privacy/sicurezza, sono disponibili nell'app :gear: **Impostazioni** → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profili -Tutti i cookie, la cronologia e i dati del sito web saranno separati per ogni profilo. È consigliabile utilizzare profili diversi per scopi diversi, ad esempio per lo shopping, il lavoro o la scuola. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy e sicurezza -- [x] Abilita **Impedisci Tracciamento Tra Siti** +- [x] Enable **Prevent Cross-Site Tracking** - Ciò abilita la [Protezione Intelligente dal Tracciamento](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp) di WebKit. La funzionalità aiuta a proteggere dal tracciamento indesiderato utilizzando l'apprendimento automatico su dispositivo per bloccare i tracciatori. ITP protegge da molte minacce comuni, ma non blocca tutte le vie di tracciamento, poiché è progettata per non interferire con l'utilizzabilità del sito web. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Abilita **Richiedi il Face ID per sbloccare la navigazione privata** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - Questa impostazione consente di bloccare le schede private dietro la biometria/PIN quando non vengono utilizzate. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Avanzate → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations L'impostazione **Protezione avanzata da tracciamento e fingerprinting** randomizza alcuni valori in modo che sia più difficile ottenere la tua fingerprint: - [x] Seleziona **Tutto il browsing** o **Browsing Privato** -#### Rapporto sulla Privacy - -Il Rapporto sulla Privacy fornisce un'istantanea dei tracciatori tra siti cui è al momento impedito profilarti, sul sito web che stai visitando. Inoltre, può mostrare un rapporto settimanale, per mostrare quali tracciatori sono stati bloccati nel tempo. - -Il Rapporto sulla Privacy è accessibile tramite il menu Impostazioni della Pagina. - -#### Misurazione degli Annunci a Tutela della Privacy +##### Misurazione degli Annunci a Tutela della Privacy - [ ] Disabilita la **Misurazione della pubblicità che tutela la privacy** @@ -285,23 +283,23 @@ Questa, presenta poche preoccupazioni sulla privacy, quindi, sebbene tu possa sc #### Navigazione privata sempre attiva -Apri Safari e tocca sul pulsante Schede, nell'angolo inferiore destro. Quindi, espandi l'elenco dei Gruppi di Schede. +Apri Safari e tocca sul pulsante Schede, nell'angolo inferiore destro. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Seleziona **Privata** La modalità di Navigazione Privata di Safari offre ulteriori protezioni della privacy. La Navigazione Privata utilizza una nuova sessione [effimera](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) per ogni scheda, a significare che le schede sono isolate l'una dall'altra. Inoltre, la Navigazione Privata, presenta altri piccoli benefici per la privacy, come il mancato invio dell'indirizzo di una pagina web ad Apple, utilizzando la funzionalità di traduzione di Safari. -Nota che la Navigazione Privata non salva i cookie e dati dei siti web, quindi, non sarà possibile rimanere connesso ai siti. Ciò può essere sconveniente. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Ciò può essere sconveniente. #### Sincronizzazione iCloud La sincronizzazione della Cronologia di Safari, dei Gruppi di Schede, delle Schede di iCloud e delle password salvate, avviene E2EE. Tuttavia, per impostazione predefinita, i segnalibri [non lo sono](https://support.apple.com/HT202303). Apple può decifrarli e accedervi in base alla propria [informativa sulla privacy](https://apple.com/legal/privacy/en-ww). -È possibile attivare E2EE per i segnalibri e i download di Safari attivando la [Protezione Avanzata dei Dati](https://support.apple.com/HT212520). Vai al tuo **nome ID Apple → iCloud → Protezione Avanzata dei Dati**. +È possibile attivare E2EE per i segnalibri e i download di Safari attivando la [Protezione Avanzata dei Dati](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Attiva la **Protezione Avanzata dei Dati** +- [x] Turn on **Advanced Data Protection** -Se utilizzi iCloud con la Protezione Avanzata dei Dati disabilitata, consigliamo inoltre di verificare e assicurarsi che la posizione di download predefinita di Safari, sia impostata localmente sul tuo dispositivo. Questa opzione si trova in :gear: **Impostazioni** → **Safari** → **Generale** → **Download**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteri diff --git a/i18n/it/os/ios-overview.md b/i18n/it/os/ios-overview.md index bdee1db9..3dab47ed 100644 --- a/i18n/it/os/ios-overview.md +++ b/i18n/it/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS è un sistema operativo mobile sviluppato da Apple per l'iPhone iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. Tuttavia, le restrizioni dell'ecosistema di Apple, in particolare per quanto riguarda i dispositivi mobili, ostacolano ancora la privacy in diversi modi. -Generalmente, consideriamo che iOS fornisca protezioni della privacy e della sicurezza migliori della media per gran parte delle persone, rispetto ai dispositivi Android di fabbrica da qualsiasi produttore. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +Generalmente, consideriamo che iOS fornisca protezioni della privacy e della sicurezza migliori della media per gran parte delle persone, rispetto ai dispositivi Android di fabbrica da qualsiasi produttore. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Blocco di Attivazione @@ -18,7 +18,7 @@ Tutti i dispositivi iOS devono essere confrontati con i server di Activation Loc ### App Store Obbligatorio -La sola fonte di app su iOS è l'App Store di Apple, che richiede un Apple ID per accedervi. Ciò significa che Apple detiene un registro di qualsiasi app tu installi sul tuo dispositivo e, probabilmente, potrebbe collegare tali informazioni alla tua identità reale, se fornisci un metodo di pagamento all'App Store. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Ciò significa che Apple detiene un registro di qualsiasi app tu installi sul tuo dispositivo e, probabilmente, potrebbe collegare tali informazioni alla tua identità reale, se fornisci un metodo di pagamento all'App Store. ### Telemetria Invadente @@ -28,6 +28,8 @@ Di recente, si è scoperto che Apple [trasmette dati analitici anche quando la c ## Configurazione consigliata +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud Gran parte delle preoccupazioni su privacy e sicurezza con i prodotti di Apple sono correlate ai loro servizi su cloud, non al loro hardware o software. Quando utilizzi i servizi di Apple come iCloud, gran parte delle tue informazioni sono archiviate sui loro server e protette con chiavi, cui Apple ha accesso di default. Puoi consultare la [documentazione di Apple](https://support.apple.com/HT202303) per le informazioni su quali servizi sono crittografati end-to-end. Qualsiasi cosa sia elencata come "in transito" o "sul server", indica che è possibile, per Apple, accedere a tali dati senza la tua autorizzazione. Questo livello d'accesso è stato occasionalmente abusato dalle autorità per aggirare il fatto che i tuoi dati sono altrimenti crittografati in sicurezza sul tuo dispositivo e, ovviamente, Apple è vulnerabile alle violazioni di dati, come ogni altra azienda. @@ -48,7 +50,7 @@ Un abbonamento a pagamento a **iCloud+** (con qualsiasi piano di archiviazione s #### Media e Acquisti -In cima all'app delle **Impostazioni**, visualizzerai il tuo nome e la tua foto di profilo, se hai un Apple ID. Selezionalo, quindi seleziona **Media e Acquisti** > **Visualizza Profilo**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Disattiva i **Consigli Personalizzati** @@ -61,7 +63,7 @@ In cima all'app delle **Impostazioni**, visualizzerai il tuo nome e la tua foto I tuoi dati sulla posizione non sono E2EE quando il tuo dispositivo è online e utilizzi Find My iPhone da remoto, per individuare il tuo dispositivo. Dovrai decidere se mantenere questi compromessi valga i vantaggi antifurto del Blocco di Attivazione. -In cima all'app delle **Impostazioni**, visualizzerai il tuo nome e la tua foto di profilo, se hai un Apple ID. Selezionalo, quindi seleziona **Find My**. Qui puoi scegliere se abilitare o disabilitare le funzionalità di posizione di Find My. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Selezionalo, quindi seleziona **Find My**. Qui puoi scegliere se abilitare o disabilitare le funzionalità di posizione di Find My. ### Settings @@ -73,9 +75,9 @@ Abilitare la **Modalità Aereo** impedisce al tuo telefono di contattare le torr #### Wi-Fi -Puoi abilitare la randomizzazione dell'indirizzo hardware per proteggerti dal tracciamento sulle reti Wi-Fi. Sulla rete a cui sei attualmente connesso, premi il pulsante :material-information:: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Attiva l'**Indirizzo Wi-Fi Privato** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** Inoltre, puoi **Limitare il Tracciamento dell'Indirizzo IP**. Ciò somiglia alla Trasmissione Privata di iCloud, ma riguarda soltanto le connessioni ai "tracciatori noti." Poiché riguarda soltanto le connessioni a server potenzialmente dannosi, quest'impostazione può tranquillamente esser lasciata abilitata, ma se desideri che *qualsiasi* traffico non sia indirizzato attraverso i server di Apple, dovresti disattivarla. @@ -85,11 +87,13 @@ Il **Bluetooth** dovrebbe essere disabilitato quando non lo stai utilizzando, po - [ ] Disattiva il **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### Generali -Il nome del tuo dispositivo iPhone conterrà di default il tuo nome e, questo, sarà visibile a chiunque, sulle reti cui ti connetti. Dovresti modificarlo in qualcosa di più generico, come "iPhone." Seleziona **Informazioni su** > **Nome** e inserisci il nome del dispositivo che preferisci. +Il nome del tuo dispositivo iPhone conterrà di default il tuo nome e, questo, sarà visibile a chiunque, sulle reti cui ti connetti. Dovresti modificarlo in qualcosa di più generico, come "iPhone." Select **About** → **Name** and enter the device name you prefer. -È importante installare frequentemente gli **Aggiornamenti Software**, per ottenere le più recenti correzioni di sicurezza. Puoi abilitare gli **Aggiornamenti Automatici** per mantenere aggiornato il tuo telefono, senza dover controllare costantemente la presenza di aggiornamenti. Seleziona **Aggiornamenti Software** > **Aggiornamenti Automatici**: +È importante installare frequentemente gli **Aggiornamenti Software**, per ottenere le più recenti correzioni di sicurezza. Puoi abilitare gli **Aggiornamenti Automatici** per mantenere aggiornato il tuo telefono, senza dover controllare costantemente la presenza di aggiornamenti. Select **Software Update** → **Automatic Updates**: - [x] Attiva **Scarica Aggiornamenti iOS** - [x] Attiva **Installa Aggiornamenti iOS** @@ -97,13 +101,13 @@ Il nome del tuo dispositivo iPhone conterrà di default il tuo nome e, questo, s **AirDrop** ti consente di trasferire facilmente file, ma può consentire a sconosciuti di inviarti file indesiderati. -- [x] Seleziona **AirDrop** > **Ricezione disattivata** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** ti consente di trasmettere facilmente i contenuti dal tuo iPhone a una TV; tuttavia, potresti non desiderarlo fare sempre. Seleziona **AirPlay e Scambio** > **AirPlay a TV automatico**: +**AirPlay** ti consente di trasmettere facilmente i contenuti dal tuo iPhone a una TV; tuttavia, potresti non desiderarlo fare sempre. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Seleziona **Mai** o **Chiedi** -**Background App Refresh** consente alle tue app di aggiornare i propri contenuti, mentre non le stai utilizzando. Ciò potrebbe causare che si creino connessioni indesiderate. Disattivare quest'opzione può anche far risparmiare batteria, ma potrebbe influire sulle capacità dell'app di ricevere informazioni aggiornate, in particolare alle app meteorologiche e di messaggistica. +**Background App Refresh** consente alle tue app di aggiornare i propri contenuti, mentre non le stai utilizzando. Ciò potrebbe causare che si creino connessioni indesiderate. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Seleziona **Background App Refresh** e disattiva qualsiasi app non desideri continui ad aggiornarsi in background. Se desideri che nessuna app si aggiorni in background, puoi selezionare **Background App Refresh** e **disattivarla**. @@ -117,19 +121,19 @@ Se non desideri che qualcuno possa controllare il tuo telefono con Siri, quando Impostare una password forte sul tuo telefono è il passo più importante che puoi intraprendere per la sicurezza fisica del dispositivo. In questo caso dovrai trovare un compromesso tra la sicurezza e la comodità: una password più lunga sarà noiosa da digitare ogni volta, ma una password o un PIN più breve sarà più facile da indovinare. Configurare Face ID o TouchID insieme a una password forte, può costituire un buon compromesso tra utilizzabilità e sicurezza. -Seleziona **Attiva Passcode** o **Modifica Passcode** > **Opzioni Passcode** > **Codice Alfanumerico Personalizzato**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). Se desideri utilizzare Face ID o Touch ID, puoi ora procedere alla configurazione. Il tuo telefono utilizzerà la password configurata in precedenza come ripiego, nel caso in cui la tua verifica biometrica dovesse fallire. I metodi biometrici di sblocco sono principalmente una comodità, sebbene impediscano alle telecamere di sicurezza o alle persone alle tue spalle di guardarti inserire il tuo codice d'accesso. Se utilizzi la biometria, dovresti sapere come disattivarla rapidamente in caso d'emergenza. Tenere premuto il tasto laterale o di accensione e *uno dei* tasti del volume, finché non visualizzi il cursore Scorri per Spegnere, disabiliterà la biometria, richiedendo il codice d'accesso per sbloccare. Inoltre, il tuo codice di sicurezza sarà richiesto al riavvio del dispositivo. -Su alcuni dispositivi precedenti, potresti dover premere cinque volte il tasto di accensione per disabilitare la biometria o, per i dispositivi con Touch ID, potresti dover soltanto tenere premuto il tasto d'accensione e nient'altro. Assicurati di provare in anticipo, così da sapere quale metodo funziona per il tuo dispositivo. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Assicurati di provare in anticipo, così da sapere quale metodo funziona per il tuo dispositivo. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. Se utilizzi la biometria e la funzione Trova il mio dispositivo nelle impostazioni dell'ID Apple, si consiglia di attivare questa nuova protezione: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Seleziona **Attiva la protezione** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. Questo ritardo ha lo scopo di dare all'utente il tempo di attivare la Modalità smarrito e di proteggere il proprio account prima che un ladro possa resettare il dispositivo. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. Questo ritardo ha lo scopo di dare all'utente il tempo di attivare la Modalità smarrito e di proteggere il proprio account prima che un ladro possa resettare il dispositivo. **Consenti Accesso Da Bloccato** ti offre delle opzioni per consentire l'accesso quando il telefono è bloccato. Più di queste opzioni disabiliti, minori saranno le azioni disponibili a qualcuno senza la tua password, ma meno comodo sarà per te. Seleziona e scegli quali di queste non desideri siano accessibili a qualcuno, qualora dovesse impossessarsi del tuo telefono. @@ -186,6 +190,8 @@ Dovresti disabilitare le analisi se non desideri inviare i dati di utilizzo ad A - [ ] Disattiva **Migliora Fitness+** - [ ] Disattiva **Migliora Sicurezza** - [ ] Disattiva **Migliora Siri e Dettatura** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disabilita gli **Annunci Personalizzati**, se non desideri ricevere annunci mirati. Select **Apple Advertising**: @@ -203,22 +209,57 @@ La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura- ### Chiamate E2EE -Le normali telefonate effettuate con l'app Telefono tramite il proprio operatore, non sono E2EE. Le chiamate di FaceTime Video e FaceTime Audio sono E2EE, o puoi utilizzare un'[altra app](../real-time-communication.md) come Signal. +Le normali telefonate effettuate con l'app Telefono tramite il proprio operatore, non sono E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### iMessage Crittografata + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +Se tu o il tuo partner di messaggistica avete abilitato iCloud Backup senza la Protezione Avanzata dei Dati, la chiave crittografica sarà memorizzata sui server di Apple, a significare che potrà accedere ai tuoi messaggi. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Oscuramento di Volti/Informazioni + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Evita il Jailbreaking Il Jailbreak di un iPhone ne mina la sicurezza e ti rende vulnerabile. Eseguire software non affidabili e di terze parti, potrebbe causare l'infezione del tuo dispositivo da malware. -### iMessage Crittografata - -Il colore della bolla del messaggio nell'app dei Messaggi indica se i tuoi messaggi sono E2EE o no. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Al momento, il solo modo per ottenere l'E2EE sui Messaggi è che entrambe le parti utilizzino iMessage sui dispositivi Apple. - -Se tu o il tuo partner di messaggistica avete abilitato iCloud Backup senza la Protezione Avanzata dei Dati, la chiave crittografica sarà memorizzata sui server di Apple, a significare che potrà accedere ai tuoi messaggi. Inoltre, lo scambio di chiavi di iMessage non è sicuro quanto le implementazioni alternative, come Signal (che ti consente di visualizzare la chiave del destinatario e di verificare tramite Codice QR), quindi non ci si dovrebbe affidare per le comunicazioni particolarmente sensibili. - -### Oscuramento di Volti/Informazioni - -Se devi nascondere informazioni in un foto, puoi utilizzare gli strumenti integrati di Apple per farlo. Apri la foto che desideri modificare, premi su modifica nell'angolo superiore destro dello schermo, quindi premi il simbolo del pennarello in alto a destra. Premi il più in basso a destra alla schermata, quindi, premi l'icona del rettangolo. Ora, puoi posizionare un rettangolo in qualsiasi punto dell'immagine. Assicurati di premere l'icona della forma in basso a sinistra e di selezionare il rettangolo riempito. **Non** utilizzare l'evidenziatore per offuscare le informazioni, poiché la sua opacità non è al 100%. - ### Beta di iOS Apple rende sempre disponibili per versioni beta di iOS in anticipo, per coloro che desiderano aiutare a trovare e segnalare i bug. Sconsigliamo di installare il software in beta sul tuo telefono. Le versioni beta sono potenzialmente instabili e potrebbero presentare vulnerabilità di sicurezza non ancora scoperte. @@ -227,4 +268,4 @@ Apple rende sempre disponibili per versioni beta di iOS in anticipo, per coloro ### Prima del Primo Sblocco -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. Lo stato *successivo* a un riavvio, ma *antecedente* allo sblocco del tuo dispositivo è noto come "Prima del Primo Sblocco" (BFU) e, quando il tuo dispositivo è in tale stato, rende [significativamente più difficile](https://belkasoft.com/checkm8_glossary), per gli strumenti forensi, di sfruttare vulnerabilità per accedere ai tuoi dati. Questo stato BFU ti consente di ricevere notifiche per le chiamate, i messaggi e le sveglie, ma gran parte dei dati sul tuo dispositivo sono ancora crittografati e inaccessibili. Ciò può essere poco pratico, quindi, considera se tali compromessi hanno senso per la tua situazione. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. Lo stato *successivo* a un riavvio, ma *antecedente* allo sblocco del tuo dispositivo è noto come "Prima del Primo Sblocco" (BFU) e, quando il tuo dispositivo è in tale stato, rende [significativamente più difficile](https://belkasoft.com/checkm8_glossary), per gli strumenti forensi, di sfruttare vulnerabilità per accedere ai tuoi dati. Questo stato BFU ti consente di ricevere notifiche per le chiamate, i messaggi e le sveglie, ma gran parte dei dati sul tuo dispositivo sono ancora crittografati e inaccessibili. Ciò può essere poco pratico, quindi, considera se tali compromessi hanno senso per la tua situazione. diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index 1e8a98d2..416a460d 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-I gestori di password integrati nei software, come i browser e i sistemi operativi, a volte non sono all'altezza di un software di gestione delle password dedicato. Il vantaggio di un gestore di password integrato è la buona integrazione con il software, ma spesso può essere molto semplice e privo di funzionalità per la privacy e la sicurezza rispetto alle alternative indipendenti. +I gestori di password integrati nei software, come i browser e i sistemi operativi, a volte non sono all'altezza di un software di gestione delle password dedicato. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Ad esempio, il gestore di password di Microsoft Edge non offre affatto E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -163,17 +163,17 @@ Questi gestori di password, le sincronizzano su un server su cloud per una facil **Bitwarden** è un gestore di password e passkey gratuito e open-source. L'obiettivo è quello di risolvere i problemi di gestione delle password per individui, team e organizzazioni aziendali. Bitwarden è una delle soluzioni migliori e più sicure per memorizzare tutti i vostri login e password, mantenendoli comodamente sincronizzati tra tutti i vostri dispositivi. -[:octicons-home-16: Pagina Principale](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Il codice utilizzato dai server di Bitwarden è [open-source](https://github.com **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Se desideri ospitare autonomamente il tuo server di Bitwarden, desidererai quasi sicuramente utilizzare Vaultwarden, rispetto al codice del server ufficiale di Bitwarden. -[:octicons-repo-16: Repository di Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribuisci } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -206,10 +206,10 @@ Il codice utilizzato dai server di Bitwarden è [open-source](https://github.com **Proton Pass** is an open-source, end-to-end encrypted password manager developed by Proton, the team behind [Proton Mail](email.md#proton-mail). It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys. -[:octicons-home-16: Pagina Principale](https://proton.me/pass){ .md-button .md-button--primary } -[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentazione"} -[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } +[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -240,13 +240,13 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-![Logo di 1Password](assets/img/password-management/1password.svg){ align=right } +![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** è un gestore di password con una forte attenzione alla sicurezza e alla facilità d'uso, che ti consente di memorizzare password, passkey, carte di credito, licenze software e qualsiasi altra informazione sensibile in una cassaforte digitale sicura. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Pagina Principale](https://1password.com/it){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/it/legal/privacy/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://support.1password.com/it/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. La tua cassaforte di 1Password è protetta sia dalla password principale che da una chiave di sicurezza randomizzata di 34 caratteri per crittografare i tuoi dati sui loro server. Tale chiave di sicurezza aggiunge un livello di protezione ai tuoi dati, poiché, essi, sono protetti da un'entropia elevata, indipendentemente dalla tua password principale. Molti altri gestori delle password si affidano interamente alla forza della tua password principale per proteggere i tuoi dati. @@ -278,10 +278,10 @@ La tua cassaforte di 1Password è protetta sia dalla password principale che da **Psono** è un gestore di password gratuito e open source dalla Germania, con particolare attenzione alla gestione delle password per i team. Psono supporta la condivisione sicura di password, file, segnalibri ed email. Tutti i codici segreti sono protetti da una password principale. -[:octicons-home-16: Pagina Home](https://psono.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
Scarica @@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Deve utilizzare un'E2EE forte, basata sugli standard e moderna. - Deve disporre di pratiche crittografiche e di sicurezza documentate approfonditamente. -- Deve disporre di un controllo pubblicato da una terza parte affidabile e indipendente. +- Must have a published audit from a reputable, independent third party. - Tutta la telemetria non essenziale dev'essere facoltativa. - Non deve raccogliere più PII di quanto necessario, per scopi di fatturazione. @@ -331,11 +331,11 @@ Queste opzioni ti consentono di gestire localmente un database di password critt **KeePassXC** is a community fork of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal of extending and improving it with new features and bugfixes to provide a feature-rich, cross-platform, and modern open-source password manager. -[:octicons-home-16: Pagina Principale](https://keepassxc.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Queste opzioni ti consentono di gestire localmente un database di password critt
-KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò potrebbe comportare la perdita di dati, se importi questo file in un altro gestore di password. Consigliamo di controllare manualmente ogni record. +KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. Consigliamo di controllare manualmente ogni record. ### KeePassDX (Android) @@ -361,10 +361,10 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Pagina Principale](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Download @@ -384,11 +384,11 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip **Strongbox** is a native password manager for iOS and macOS. Supportando sia i formati di KeePass che di Password Safe, è utilizzabile insieme ad altri gestori di password, come KeePassXC, sulle piattaforme non Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier, with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. -[:octicons-home-16: Pagina Principale](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Scarica @@ -399,7 +399,7 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip -Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps.apple.com/it/app/strongbox-zero/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco. ### gopass (CLI) @@ -407,12 +407,12 @@ Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps ![Logo di gopass](assets/img/password-management/gopass.svg){ align=right } -**gopass** è un gestore di password minimale per la riga di comando scritto in Go. Può essere utilizzato all'interno di applicazioni di scripting e funziona su tutti i principali sistemi operativi desktop e server (Linux, macOS, BSD, Windows). +**gopass** è un gestore di password minimale per la riga di comando scritto in Go. It can be used within scripting applications and works on all major desktop and server operating systems. -[:octicons-home-16: Pagina Principale](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps - ### Criteri **Ti preghiamo di notare che non siamo affiliati con alcun progetto consigliato.** Oltre ai [nostri criteri standard](about/criteria.md), abbiamo sviluppato una serie chiara di requisiti per consentirci di fornire consigli oggettivi. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere di utilizzare un progetto e di condurre le tue ricerche per assicurarti che si tratti della scelta adatta a te. diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 7fe8afb1..69bf3f69 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -84,7 +84,7 @@ Per ulteriori dettagli su ogni progetto, perché è stato scelto e ulteriori con We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/ja/assets/img/ios/contact-permissions-dark.png b/i18n/ja/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/ja/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/ja/assets/img/ios/contact-permissions-light.png b/i18n/ja/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/ja/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/ja/assets/img/ios/photo-permissions-dark.png b/i18n/ja/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/ja/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/ja/assets/img/ios/photo-permissions-light.png b/i18n/ja/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/ja/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/ja/assets/img/ios/private-access-dark.png b/i18n/ja/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/ja/assets/img/ios/private-access-dark.png differ diff --git a/i18n/ja/assets/img/ios/private-access-light.png b/i18n/ja/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/ja/assets/img/ios/private-access-light.png differ diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index 787037a0..d63ef7c8 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### プライバシーとセキュリティ - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### プライバシーレポート - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -プライバシーレポートには、ページ設定メニューからアクセスできます。 - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud同期 Safariの履歴、タブグループ、iCloudタブ、保存されたパスワードの同期は端末間暗号化によって行われます。 However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). **Apple ID名 → iCloud → 高度なデータ保護**にアクセスしてください。 +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] **高度なデータ保護**を有効にする +- [x] Turn on **Advanced Data Protection** -高度なデータ保護を無効にしてiCloudを使用している場合は、Safariのデフォルトのダウンロード場所が、デバイスのローカルに設定されているかどうかを確認することもお勧めします。 This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## 規準 diff --git a/i18n/ja/os/ios-overview.md b/i18n/ja/os/ios-overview.md index 7d37a9a5..543d25df 100644 --- a/i18n/ja/os/ios-overview.md +++ b/i18n/ja/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### アクティベーションロック @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## 推奨する設定 +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### 一般 -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### 暗号化されたiMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### 脱獄(Jailbreaking)を行わないこと Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### 暗号化されたiMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOSのベータ版 Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. お使いの電話にベータ版ソフトウェアをインストールすることはお勧めしません。 Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 6b3ba869..d7f5dcbe 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -145,7 +145,7 @@ schema:

詳細

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden レポジトリー](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=ドキュメンテーション} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=貢献 } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. 各記録を手動でチェックすることをお勧めします。 +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. 各記録を手動でチェックすることをお勧めします。 ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### 規準 **私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。 diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index 63cb5a10..8b83a4a2 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/ko/assets/img/ios/contact-permissions-dark.png b/i18n/ko/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/ko/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/ko/assets/img/ios/contact-permissions-light.png b/i18n/ko/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/ko/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/ko/assets/img/ios/photo-permissions-dark.png b/i18n/ko/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/ko/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/ko/assets/img/ios/photo-permissions-light.png b/i18n/ko/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/ko/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/ko/assets/img/ios/private-access-dark.png b/i18n/ko/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/ko/assets/img/ios/private-access-dark.png differ diff --git a/i18n/ko/assets/img/ios/private-access-light.png b/i18n/ko/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/ko/assets/img/ios/private-access-light.png differ diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index 2432654f..30fa9497 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -233,7 +233,7 @@ iOS에서는 웹 브라우징이 가능한 모든 앱이 Apple에서 제공하 ![Safari 로고](assets/img/browsers/safari.svg){ align=right } -**Safari**는 iOS 기본 브라우저입니다. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari**는 iOS 기본 브라우저입니다. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ iOS에서는 웹 브라우징이 가능한 모든 앱이 Apple에서 제공하 We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### 개인 정보 및 보안 -- [x] **크로스 사이트 추적 방지** 활성화 +- [x] Enable **Prevent Cross-Site Tracking** - Webkit의 [지능형 추적 방지](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp)가 활성화됩니다. 해당 기능은 온 디바이스(On-device) 머신 러닝을 이용해 추적기를 중단시켜 원치 않는 추적을 방지하는 데 도움을 줍니다. 지능형 추적 방지는 많은 일반적인 위협을 방지하지만, 웹사이트 사용성을 방지하지 않도록 설계되었기 때문에 모든 추적 경로를 차단하지는 않습니다. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### 개인정보 보호 리포트 - -개인정보 보호 리포트는 현재 방문 중인 웹사이트에서 사용자 정보를 수집하지 못하도록 차단된 크로스 사이트 추적기 정보 요약을 제공합니다. 시간 경과에 따라 어떤 추적기가 차단됐는지 보여주는 주간 리포트를 표시할 수도 있습니다. - -개인정보 보호 리포트는 페이지 설정 메뉴에서 접근할 수 있습니다. - -#### 개인정보 보호 광고 측정 +##### 개인정보 보호 광고 측정 - [ ] **개인 정보 보호 광고 측정** 비활성화 @@ -285,23 +283,23 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c #### 항상 개인정보 보호 브라우징 -Safari를 열고 우측 하단의 탭 버튼을 탭합니다. 이후, 탭 그룹 목록을 펼칩니다. +Safari를 열고 우측 하단의 탭 버튼을 탭합니다. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] **개인정보 보호**를 활성화합니다. Safari 개인정보 보호 브라우징 모드는 추가적인 프라이버시 보호 기능을 제공합니다. 개인정보 보호 브라우징 모드는 각 탭마다 새로운 [임시](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) 세션을 사용하여, 탭을 서로 격리합니다. 개인정보 보호 브라우징 모드에서는 Safari 번역 기능 사용 시 웹페이지 주소가 Apple에 전송되지 않는 등, 프라이버시에 도움이 되는 여타 소소한 이점도 존재합니다. -단, 개인정보 보호 브라우징 모드는 쿠키 및 웹사이트 데이터를 저장하지 않으므로 사이트 로그인을 유지할 수 없음을 알아두어야 합니다. 이로 인해 사용이 불편할 수 있습니다. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. 이로 인해 사용이 불편할 수 있습니다. #### iCloud 동기화 Safari 방문 기록, 탭 그룹, iCloud 탭, 저장된 암호는 E2EE 동기화됩니다. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). **Apple 사용자 이름 → iCloud → 고급 데이터 보호**로 이동하세요. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] **고급 데이터 보호** 활성화 +- [x] Turn on **Advanced Data Protection** -고급 데이터 보호가 비활성화된 iCloud를 사용하는 경우, 여러분의 기기에서 Safari 기본 다운로드 위치 설정을 확인하고 로컬로 지정할 것을 권장드립니다. 해당 옵션은 :gear: **설정** → **Safari** → **일반** → **다운로드**에서 확인할 수 있습니다. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## 평가 기준 diff --git a/i18n/ko/os/ios-overview.md b/i18n/ko/os/ios-overview.md index e6073f64..f6d78c27 100644 --- a/i18n/ko/os/ios-overview.md +++ b/i18n/ko/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## 권장 설정 +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 1933d4c2..01b80d64 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-브라우저나 운영 체제 등에 내장된 비밀번호 관리자는 전용 비밀번호 관리자 소프트웨어에 비해 부족한 경우가 있습니다. 내장된 비밀번호 관리자는 본체 소프트웨어와 잘 통합되어 있다는 장점이 있지만, 기능이 매우 단조롭고 프라이버시 및 보안 기능이 부족한 경우가 많습니다. +브라우저나 운영 체제 등에 내장된 비밀번호 관리자는 전용 비밀번호 관리자 소프트웨어에 비해 부족한 경우가 있습니다. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. 예를 들어, Microsoft Edge 내의 비밀번호 관리자는 E2EE를 전혀 제공하지 않습니다. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ schema: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Vaultwarden은 개인 서버에서 Bitwarden을 자체 호스팅하는 경우 공식 Bitwarden 서버 코드보다 선호됩니다. -[:octicons-repo-16: Vaultwarden 저장소](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=문서} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=기부 } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. 1Password 보관함은 마스터 비밀번호와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. 이 보안 키의 존재로 인해, 여러분은 마스터 비밀번호 강도에 관계없이 여러분의 데이터를 높은 엔트로피로 보호할 수 있습니다. 대부분의 다른 비밀번호 관리자는 사용자 데이터 보호를 사용자의 마스터 비밀번호 강도에만 전적으로 의존합니다. @@ -280,7 +280,7 @@ Traditionally, 1Password has offered the best password manager user experience f [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - 강력한 표준 기반/최신 E2EE를 활용해야 합니다. - 암호화 및 보안 사례를 철저히 문서화해야 합니다. -- 평한이 좋은 독립적인 제3자로부터 공개 감사를 받아야 합니다. +- Must have a published audit from a reputable, independent third party. - 필수적이지 않은 원격 분석 데이터 수집은 모두 선택 사항이어야 합니다. - 요금 청구 용도로 필요한 것 이상으로 PII를 수집해서는 안 됩니다. @@ -333,9 +333,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i -KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) 파일로 저장합니다. 즉, 해당 파일을 다른 비밀번호 관리자로 불러올 경우 데이터 손실이 발생할 수 있습니다. 각 데이터 항목을 수동으로 확인해보는 것이 좋습니다. +KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) 파일로 저장합니다. You may encounter data loss if you import this file into another password manager. 각 데이터 항목을 수동으로 확인해보는 것이 좋습니다. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). 해당 버전은 공격 표면을 최소화하기 위해 만들어졌습니다. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). 해당 버전은 공격 표면을 최소화하기 위해 만들어졌습니다. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### 평가 기준 **Privacy Guides는 권장 목록의 어떠한 프로젝트와도 제휴를 맺지 않았습니다.** 객관적인 권장 목록을 제공하기 위해, [일반적인 평가 기준](about/criteria.md)에 더해 명확한 요구 사항을 정립하였습니다. 어떠한 프로젝트를 선택해 사용하기 전에, 이러한 요구 사항들을 숙지하고 여러분 스스로 조사하는 과정을 거쳐 적절한 선택을 하시기 바랍니다. diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index f9e69ae2..eeb738a2 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/ku-IQ/assets/img/ios/contact-permissions-dark.png b/i18n/ku-IQ/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/ku-IQ/assets/img/ios/contact-permissions-light.png b/i18n/ku-IQ/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/ku-IQ/assets/img/ios/photo-permissions-dark.png b/i18n/ku-IQ/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/ku-IQ/assets/img/ios/photo-permissions-light.png b/i18n/ku-IQ/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/ku-IQ/assets/img/ios/private-access-dark.png b/i18n/ku-IQ/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/private-access-dark.png differ diff --git a/i18n/ku-IQ/assets/img/ios/private-access-light.png b/i18n/ku-IQ/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/ku-IQ/assets/img/ios/private-access-light.png differ diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index 739eceed..be774059 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/ku-IQ/os/ios-overview.md b/i18n/ku-IQ/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/ku-IQ/os/ios-overview.md +++ b/i18n/ku-IQ/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index aa493caf..656e2983 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index 5d54b69b..fbc1f4b9 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/nl/assets/img/ios/contact-permissions-dark.png b/i18n/nl/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/nl/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/nl/assets/img/ios/contact-permissions-light.png b/i18n/nl/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/nl/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/nl/assets/img/ios/photo-permissions-dark.png b/i18n/nl/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/nl/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/nl/assets/img/ios/photo-permissions-light.png b/i18n/nl/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/nl/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/nl/assets/img/ios/private-access-dark.png b/i18n/nl/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/nl/assets/img/ios/private-access-dark.png differ diff --git a/i18n/nl/assets/img/ios/private-access-light.png b/i18n/nl/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/nl/assets/img/ios/private-access-light.png differ diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index 8c749d28..877ef9ce 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -233,7 +233,7 @@ Op iOS is elke app die op het web kan surfen beperkt tot [](https://developer.ap ![Safari-logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ Op iOS is elke app die op het web kan surfen beperkt tot [](https://developer.ap We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & beveiliging -- [x] Activeer **Voorkom Cross-Site Tracking** +- [x] Enable **Prevent Cross-Site Tracking** - Dit maakt WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp)mogelijk. De functie helpt beschermen tegen ongewenste tracking door gebruik te maken van on-device machine learning om trackers te stoppen. ITP beschermt tegen veel voorkomende bedreigingen, maar blokkeert niet alle tracking-wegen omdat het is ontworpen om de bruikbaarheid van websites niet te hinderen. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacyrapport - -Privacyrapport biedt een momentopname van cross-site trackers die u momenteel niet kunnen profileren op de website die u bezoekt. Het kan ook een wekelijks rapport weergeven om te laten zien welke trackers in de loop van de tijd zijn geblokkeerd. - -Privacyrapport is toegankelijk via het menu Pagina-instellingen. - -#### Privacybehoudende advertentiemeting +##### Privacybehoudende advertentiemeting - [ ] Schakel **Privacy Preserving Ad Measurement**uit @@ -285,23 +283,23 @@ De functie heeft op zichzelf weinig privacyproblemen, dus hoewel je ervoor kunt #### Altijd privé browsen -Open Safari en tik op de knop Tabbladen, rechtsonder. Vouw vervolgens de lijst Tabbladgroepen uit. +Open Safari en tik op de knop Tabbladen, rechtsonder. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Selecteer **Privé** Safari's Privénavigatie modus biedt extra bescherming van de privacy. Private Browsing gebruikt een nieuwe [kortstondige](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) sessie voor elk tabblad, wat betekent dat tabbladen van elkaar geïsoleerd zijn. Als er een [kwetsbaarheid is in uBlock Origin](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css) kan een filter van een derde partij kwaadaardige regels toevoegen die mogelijk gebruikersgegevens kunnen stelen. -Houd er rekening mee dat privénavigatie geen cookies en gegevens opslaat, zodat het niet mogelijk is om ingelogd te blijven op sites. Dit kan een ongemak zijn. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Dit kan een ongemak zijn. #### iCloud Synchronisatie De synchronisatie van de Safari-geschiedenis, tabbladgroepen, iCloud-tabbladen en opgeslagen wachtwoorden verloopt via E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Ga naar jouw **Apple ID naam → iCloud → Geavanceerde gegevensbescherming**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Zet **Geavanceerde gegevensbescherming aan** +- [x] Turn on **Advanced Data Protection** -Als je iCloud gebruikt terwijl Geavanceerde gegevensbescherming is uitgeschakeld, raden we je ook aan te controleren of de standaard downloadlocatie van Safari is ingesteld op lokaal op jouw apparaat. Extra filterlijsten kunnen de prestaties beïnvloeden en het aanvalsoppervlak vergroten, dus pas alleen toe wat u nodig hebt. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/nl/os/ios-overview.md b/i18n/nl/os/ios-overview.md index f4dcc08b..66cc5327 100644 --- a/i18n/nl/os/ios-overview.md +++ b/i18n/nl/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is een mobiel besturingssysteem ontwikkeld door Apple voor de i iOS-apparaten worden regelmatig geprijsd door beveiligingsexperts wegens hun robuuste gegevensbeveiliging en voor het volgen van moderne, beste praktijken. Echter, de restrictiviteit van Apples ecosysteem - met name met hun mobiele apparaten - belemmert privacy nog steeds op een aantal manieren. -We zijn over het algemeen van mening dat iOS voor de meeste mensen een beter dan gemiddelde bescherming biedt op het gebied van privacy en beveiliging, vergeleken met klassiek Android-apparaten van welke fabrikant dan ook. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We zijn over het algemeen van mening dat iOS voor de meeste mensen een beter dan gemiddelde bescherming biedt op het gebied van privacy en beveiliging, vergeleken met klassiek Android-apparaten van welke fabrikant dan ook. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activeringsslot @@ -18,7 +18,7 @@ Alle iOS-apparaten moeten worden gecontroleerd door de Activeringsslot-servers v ### Verplichte App Store -De enige bron voor apps op iOS is de App Store van Apple, waarvoor je een Apple ID nodig hebt om toegang te krijgen. Dit betekent dat Apple kennis heeft van elke app die je op je apparaat installeert en die informatie waarschijnlijk kan koppelen aan je werkelijke identiteit als je de App Store een betaalmethode geeft. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. Dit betekent dat Apple kennis heeft van elke app die je op je apparaat installeert en die informatie waarschijnlijk kan koppelen aan je werkelijke identiteit als je de App Store een betaalmethode geeft. ### Invasieve telemetrie @@ -28,6 +28,8 @@ Meer recentelijk is ontdekt dat Apple [analyses verstuurt, zelfs als het delen v ## Aanbevolen configuratie +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud De meeste zorgen over privacy en beveiliging van Apple producten hebben te maken met hun clouddiensten, niet met hun hardware of software. Wanneer je gebruik maakt van Apple diensten zoals iCloud, wordt het merendeel van je gegevens opgeslagen op hun servers en beveiligd met sleutels waar Apple standaard toegang toe heeft. Je kunt [de documentatie van Apple](https://support.apple.com/HT202303) raadplegen voor informatie over welke diensten end-to-end versleuteld zijn. Alles in de lijst "in transit" of "on server" betekent dat Apple toegang kan krijgen tot die gegevens zonder jouw toestemming. Dit toegangsniveau is af en toe misbruikt door wetshandhavers om het feit te omzeilen dat je gegevens anders veilig versleuteld op je apparaat staan. Natuurlijk is Apple net als elk ander bedrijf kwetsbaar voor datalekken. @@ -48,7 +50,7 @@ Een betaald **iCloud+** abonnement (met elk iCloud opslagplan) wordt geleverd me #### Media & Aankopen -Bovenaan de **Instellingen-app** zie je je naam en profielfoto als je bent aangemeld bij iCloud. Selecteer dat en selecteer vervolgens **Media & Aankopen** > **Account bekijken**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Schakel **Gepersonaliseerde aanbevelingen** uit @@ -61,7 +63,7 @@ Bovenaan de **Instellingen-app** zie je je naam en profielfoto als je bent aange Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -Bovenaan de **Instellingen-app** zie je je naam en profielfoto als je bent aangemeld bij iCloud. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 553bda65..c74a09d3 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Ingebouwde wachtwoord managers in software zoals browsers en besturingssystemen zijn soms niet zo goed als speciale software voor wachtwoordbeheer. Het voordeel van een ingebouwde wachtwoord manager is een goede integratie met de software, maar het kan vaak erg eenvoudig zijn en mist privacy- en beveiligingsfuncties die aanbiedingen van derden wel hebben. +Ingebouwde wachtwoord managers in software zoals browsers en besturingssystemen zijn soms niet zo goed als speciale software voor wachtwoordbeheer. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. De wachtwoord manager in Microsoft Edge biedt bijvoorbeeld helemaal geen E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Deze wachtwoordbeheerders synchroniseren jouw wachtwoorden met een cloudserver v [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Deze wachtwoordbeheerders synchroniseren jouw wachtwoorden met een cloudserver v - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Als je Bitwarden zelf wilt hosten op jouw eigen server, wil je vrijwel zeker Vaultwarden gebruiken in plaats van de officiële servercode van Bitwarden. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Broncode" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Bijdragen} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Uw 1Password-kluis is beveiligd met zowel jouw hoofdwachtwoord als een gerandomiseerde beveiligingssleutel van 34 tekens om jouw gegevens op hun servers te versleutelen. Deze beveiligingssleutel voegt een beschermingslaag toe aan jouw gegevens omdat jouw gegevens worden beveiligd met een hoge entropie, ongeacht jouw hoofdwachtwoord. Veel andere oplossingen voor wachtwoordbeheer zijn volledig afhankelijk van de sterkte van jouw hoofdwachtwoord om jouw gegevens te beveiligen. @@ -280,7 +280,7 @@ Uw 1Password-kluis is beveiligd met zowel jouw hoofdwachtwoord als een gerandomi [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Moet gebruik maken van sterke, op standaarden gebaseerde/moderne E2EE. - Moet beschikken over grondig gedocumenteerde encryptie- en beveiligingspraktijken. -- Moet een gepubliceerde audit hebben van een gerenommeerde, onafhankelijke derde partij. +- Must have a published audit from a reputable, independent third party. - Alle niet-essentiële telemetrie moet optioneel zijn. - Mag niet meer PII verzamelen dan nodig is voor factureringsdoeleinden. @@ -333,9 +333,9 @@ Met deze opties kunt je een versleutelde wachtwoorddatabase lokaal beheren. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Met deze opties kunt je een versleutelde wachtwoorddatabase lokaal beheren. -KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) bestanden. Dit kan gegevensverlies betekenen als je dit bestand importeert in een andere wachtwoordmanager. Wij adviseren je om elke registratie handmatig te controleren. +KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) bestanden. You may encounter data loss if you import this file into another password manager. Wij adviseren je om elke registratie handmatig te controleren. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Deze versie is uitgekleed in een poging het aanvalsoppervlak te verkleinen. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Deze versie is uitgekleed in een poging het aanvalsoppervlak te verkleinen. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt. diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index 8285dfd2..e6a2d121 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -84,7 +84,7 @@ Voor meer details over elk project, waarom ze werden gekozen, en extra tips of t We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/pl/assets/img/ios/contact-permissions-dark.png b/i18n/pl/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/pl/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/pl/assets/img/ios/contact-permissions-light.png b/i18n/pl/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/pl/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/pl/assets/img/ios/photo-permissions-dark.png b/i18n/pl/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/pl/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/pl/assets/img/ios/photo-permissions-light.png b/i18n/pl/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/pl/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/pl/assets/img/ios/private-access-dark.png b/i18n/pl/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/pl/assets/img/ios/private-access-dark.png differ diff --git a/i18n/pl/assets/img/ios/private-access-light.png b/i18n/pl/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/pl/assets/img/ios/private-access-light.png differ diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index 14f6c1ee..ba2bebeb 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -233,7 +233,7 @@ W systemie iOS każda aplikacja, która umożliwia przeglądanie Internetu [ma o ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ W systemie iOS każda aplikacja, która umożliwia przeglądanie Internetu [ma o We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Prywatność i bezpieczeństwo - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/pl/os/ios-overview.md b/i18n/pl/os/ios-overview.md index 15e445a5..1b60e4e5 100644 --- a/i18n/pl/os/ios-overview.md +++ b/i18n/pl/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 2b66621d..e0af7aa9 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 7ce3a0ee..c5fe4a8e 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/pt-BR/assets/img/ios/contact-permissions-dark.png b/i18n/pt-BR/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/pt-BR/assets/img/ios/contact-permissions-light.png b/i18n/pt-BR/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/pt-BR/assets/img/ios/photo-permissions-dark.png b/i18n/pt-BR/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/pt-BR/assets/img/ios/photo-permissions-light.png b/i18n/pt-BR/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/pt-BR/assets/img/ios/private-access-dark.png b/i18n/pt-BR/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/private-access-dark.png differ diff --git a/i18n/pt-BR/assets/img/ios/private-access-light.png b/i18n/pt-BR/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/pt-BR/assets/img/ios/private-access-light.png differ diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index 03502250..9438189b 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacidade & Segurança - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). O recurso ajuda a proteger contra o rastreamento indesejado, usando o aprendizado de máquina no dispositivo para impedir os rastreadores. O ITP protege contra muitas ameaças comuns, mas não bloqueia todas as vias de rastreamento porque foi projetado para não interferir na usabilidade do site. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/pt-BR/os/ios-overview.md b/i18n/pt-BR/os/ios-overview.md index 3548b59c..bd9bbfdf 100644 --- a/i18n/pt-BR/os/ios-overview.md +++ b/i18n/pt-BR/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Firefox +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index 9f88f184..2cda34f2 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Gerenciadores de senhas que vêm de fábrica em aplicativos como navegadores e sistemas operacionais às vezes não são tão bons quanto um aplicativo exclusivo para gerenciamento de senhas. A vantagem de um gerenciador de senhas interno é a boa integração com o programa, mas, em geral, ele pode ser muito simples e não ter os recursos de privacidade e segurança que as ofertas autônomas têm. +Gerenciadores de senhas que vêm de fábrica em aplicativos como navegadores e sistemas operacionais às vezes não são tão bons quanto um aplicativo exclusivo para gerenciamento de senhas. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Por exemplo, o gerenciador de senhas do Microsoft Edge não oferece em absoluto o E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem p [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem p - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Se você deseja hospedar o Bitwarden em seu próprio servidor, é quase certo que queira usar o Vaultwarden em vez do código de servidor oficial do Bitwarden. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Seu cofre do 1Password é protegido com sua senha mestra e uma chave de segurança aleatória de 34 caracteres para criptografar seus dados nos servidores. Essa chave de segurança adiciona uma camada de proteção aos seus dados porque eles são protegidos com alta entropia, independentemente da sua senha mestra. Muitas outras soluções de gerenciador de senhas dependem totalmente da força de sua senha mestra para proteger seus dados. @@ -280,7 +280,7 @@ Seu cofre do 1Password é protegido com sua senha mestra e uma chave de seguran [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Deve ter práticas de criptografia e segurança totalmente documentadas. -- Deve ter uma auditoria publicada por um terceiro independente e de boa reputação. +- Must have a published audit from a reputable, independent third party. - Toda telemetria não essencial deve ser opcional. - Não deve coletar mais PII (dados pessoais identificáveis) do que o necessário para fins de faturamento. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 209a1cc0..57df1ccb 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -84,7 +84,7 @@ Para mais detalhes sobre cada projeto, porque foram escolhidos, e dicas ou truqu We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/pt/assets/img/ios/contact-permissions-dark.png b/i18n/pt/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/pt/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/pt/assets/img/ios/contact-permissions-light.png b/i18n/pt/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/pt/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/pt/assets/img/ios/photo-permissions-dark.png b/i18n/pt/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/pt/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/pt/assets/img/ios/photo-permissions-light.png b/i18n/pt/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/pt/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/pt/assets/img/ios/private-access-dark.png b/i18n/pt/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/pt/assets/img/ios/private-access-dark.png differ diff --git a/i18n/pt/assets/img/ios/private-access-light.png b/i18n/pt/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/pt/assets/img/ios/private-access-light.png differ diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index 734bb904..af39794b 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -233,7 +233,7 @@ No iOS, qualquer aplicação que possa navegar na Web está [limitada](https://d ![Logótipo Safari](assets/img/browsers/safari.svg){ align=right } -O **Safari** é o navegador predefinido no iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +O **Safari** é o navegador predefinido no iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ O **Safari** é o navegador predefinido no iOS. It includes [privacy features](h We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacidade & Segurança -- [x] Ativar **Prevenir o rastreio entre sites** +- [x] Enable **Prevent Cross-Site Tracking** - Isto liga a [Proteção Inteligente de Rastreio da WebKit](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). A funcionalidade ajuda a proteger contra o rastreio indesejado, utilizando a aprendizagem automática no dispositivo para impedir os rastreadores. A ITP contra a monitorização protege-o contra muitas ameaças comuns, mas não bloqueia todos os modos de rastreio, uma vez que foi concebida para ter um impacto mínimo ou nulo na usabilidade do site. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Relatório de Privacidade - -O Relatório de Privacidade fornece uma foto de rastreadores entre sites atualmente impedidos de criar perfis no site que está a visitar. Também pode exibir um relatório semanal para mostrar quais rastreadores foram bloqueados ao longo do tempo. - -O Relatório de Privacidade é acessível através do menu de Configurações. - -#### Medidor de Anúncios Respeitador de Privacidade +##### Medidor de Anúncios Respeitador de Privacidade - [ ] Desativar **Medidor de Anúncios Respeitador de Privacidade** @@ -285,23 +283,23 @@ A funcionalidade tem poucas preocupações de privacidade por si só, então enq #### Navegação Privada sempre-ativa -Abra o Safari e clique no botão Abas, localizado na parte inferior direita. Depois, expanda a lista de Grupos de Abas. +Abra o Safari e clique no botão Abas, localizado na parte inferior direita. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Selecione **Privado** O modo de Navegação Privada do Safari oferece adicionais proteções de privacidade. A Navegação Privada usa uma nova sessão [efémera](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) para cada aba, o que significa que as abas estão isoladas uma da outra. Também há outras vantagens pequenas em privacidade com a Navegação Privada, como não enviar o endereço de página de web à Apple quando usar a funcionalidade de tradução do Safari. -Tenha em atenção que a Navegação Privada não guarda cookies e dados de sítios Web, pelo que não será possível permanecer ligado a sítios. Isto pode ser uma inconveniência. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Isto pode ser uma inconveniência. #### Sincronização iCloud A sincronização do histórico do Safari, grupos de separadores, separadores do iCloud e palavras-passe guardadas são E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Aceda ao seu **Nome de ID Apple → iCloud → Proteção de Dados Avançada**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Ligue a **Proteção de Dados Avançada** +- [x] Turn on **Advanced Data Protection** -Se utilizar o iCloud com a Proteção Avançada de Dados desativada, também recomendamos que verifique se a localização de transferência predefinida do Safari está definida para localmente no seu dispositivo. Esta opção pode ser encontrada em :gear: **Definições** → **Safari** → **General** → **Transferências**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Framadate diff --git a/i18n/pt/os/ios-overview.md b/i18n/pt/os/ios-overview.md index eeda590d..14f037bb 100644 --- a/i18n/pt/os/ios-overview.md +++ b/i18n/pt/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Configuração recomendada +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index 35422a7b..9c83d8d8 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Os gestores de palavras-passe integrados em software, como browsers e sistemas operativos, não são, por vezes, tão bons como o software dedicado de gestão de palavras-passe. A vantagem de um gestor de palavras-passe integrado é a sua boa integração com o software em causa, mas muitas vezes pode ser muito simples e carecer de funcionalidades de privacidade e segurança que as ofertas autónomas possuem. +Os gestores de palavras-passe integrados em software, como browsers e sistemas operativos, não são, por vezes, tão bons como o software dedicado de gestão de palavras-passe. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Por exemplo, o gestor de palavras-passe no Microsoft Edge não oferece E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Estes gestores de palavras-passe sincronizam as suas palavras-passe com um servi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Estes gestores de palavras-passe sincronizam as suas palavras-passe com um servi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Se você está a pensar auto-hospedar o Bitwarden no seu próprio servidor, vai certamente querer usar o Vaultwarden sobre o código de servidor oficial do Bitwarden. -[:octicons-repo-16: Repositório Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribuir } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. O seu cofre 1Password é protegido com a sua palavra-passe mestra e uma chave de segurança aleatória de 34 caracteres, de forma a encriptar os seus dados nos seus servidores. Esta chave de segurança acrescenta uma camada de proteção aos seus dados, uma vez que estes são protegidos com elevada entropia, independentemente da sua palavra-passe mestra. Para proteger os seus dados, muitas outras soluções de gestão de palavras-passe dependem inteiramente da força da sua palavra-passe mestra. @@ -280,7 +280,7 @@ O seu cofre 1Password é protegido com a sua palavra-passe mestra e uma chave de [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Devem utilizar E2EE forte, standard/moderno. - Devem ter práticas de encriptação e segurança completamente documentadas. -- Devem ter uma auditoria publicada por uma entidade independente de renome. +- Must have a published audit from a reputable, independent third party. - Toda a telemetria não essencial deve ser facultativa. - Não podem recolher mais informações pessoais do que as necessárias para efeitos de faturação. @@ -333,9 +333,9 @@ Estas opções permitem-lhe gerir localmente uma base de dados de palavras-passe [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Estas opções permitem-lhe gerir localmente uma base de dados de palavras-passe -O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Este facto poderá originar perda de dados, se importar o ficheiro noutro gestor de palavras-passe. Aconselhamos a verificação manual de cada registo. +O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). You may encounter data loss if you import this file into another password manager. Aconselhamos a verificação manual de cada registo. ### KeePassDX (Android) @@ -362,9 +362,9 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Esta versão é simplificada e procura reduzir a superfície de ataque. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Esta versão é simplificada e procura reduzir a superfície de ataque. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Critérios **Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si. diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index 7436800a..e0513299 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -84,7 +84,7 @@ Para obter mais detalhes sobre cada projeto, o motivo pelo qual foi escolhido e We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/ru/assets/img/ios/contact-permissions-dark.png b/i18n/ru/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/ru/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/ru/assets/img/ios/contact-permissions-light.png b/i18n/ru/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/ru/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/ru/assets/img/ios/photo-permissions-dark.png b/i18n/ru/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/ru/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/ru/assets/img/ios/photo-permissions-light.png b/i18n/ru/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/ru/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/ru/assets/img/ios/private-access-dark.png b/i18n/ru/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/ru/assets/img/ios/private-access-dark.png differ diff --git a/i18n/ru/assets/img/ios/private-access-light.png b/i18n/ru/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/ru/assets/img/ios/private-access-light.png differ diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index a123e32e..4000951f 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -233,7 +233,7 @@ Because Mull has more advanced and strict privacy protections enabled by default ![Логотип Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** — браузер по умолчанию на iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** — браузер по умолчанию на iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ Because Mull has more advanced and strict privacy protections enabled by default We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Приватность и защита -- [x] Включи **Без перекрестного отслеживания** +- [x] Enable **Prevent Cross-Site Tracking** - Это активирует функцию WebKit: [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). Эта функция помогает защититься от нежелательного отслеживания, используя машинное обучение на устройстве для остановки отслеживающих устройств. ITP защищает от многих распространенных угроз, но не блокирует все пути слежения, поскольку разработан таким образом, чтобы не мешать удобству использования сайта. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Отчет о конфиденциальности - -«Отчет о конфиденциальности» представляет собой обзор межсайтовых трекеров, которым в настоящее время запрещено создавать ваш профиль на посещаемом вами сайте. Функция также показывает еженедельный отчет о количестве заблокированных трекеров в течение определенного времени. - -Отчет о конфиденциальности доступен через меню "Настройки страницы". - -#### Конфиденциальные рекламные отчеты +##### Конфиденциальные рекламные отчеты - [ ] Отключи **Конфиденциальные рекламные отчеты** @@ -285,23 +283,23 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c #### Всегда включенный частный доступ -Откройте Safari и нажмите кнопку Вкладки, расположенную в правом нижнем углу. Затем разверните список Группы вкладок. +Откройте Safari и нажмите кнопку Вкладки, расположенную в правом нижнем углу. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Выбери **Частный доступ** Режим Частный доступ в Safari обеспечивает дополнительную защиту конфиденциальности. Приватный просмотр использует новую [эфемерную](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) сессию для каждой вкладки, то есть вкладки изолированы друг от друга. При использовании частного доступа есть и другие небольшие преимущества, например, не отправлять адрес веб-страницы в Apple при использовании функции перевода в Safari. -Обрати внимание, что частный доступ не сохраняет файлы cookie и данные веб-сайтов, поэтому оставаться залогиненным на сайтах не получится. Это может доставить неудобства. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Это может доставить неудобства. #### Синхронизация iCloud Синхронизация истории Safari, групп вкладок, вкладок iCloud и сохраненных паролей осуществляется с E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Перейди к настройке **Apple ID → iCloud → Расширенная защита данных**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Включи **Расширенная защита данных** +- [x] Turn on **Advanced Data Protection** -Если вы используете iCloud вместе с расширенной защитой данных, мы также рекомендуем проверить, что место по умолчанию для загрузки файлов в Safari установлено локально на устройстве. Эта опция может быть найдена в :gear: **Настройки** → **Safari** → **Основные** → **Загрузки**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Критерии diff --git a/i18n/ru/os/ios-overview.md b/i18n/ru/os/ios-overview.md index f11b4539..0a7739f3 100644 --- a/i18n/ru/os/ios-overview.md +++ b/i18n/ru/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Рекомендованные настройки +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 67aad0a9..977b6268 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -145,7 +145,7 @@ schema:

Инфо.

-Встроенные менеджеры паролей, например в браузерах и операционных системах, иногда не так хороши, как специализированные программы для управления паролями. Преимуществом встроенных менеджеров паролей является хорошая интеграция с программным обеспечением, но зачастую они могут быть очень простыми и не иметь функций конфиденциальности и безопасности, которыми обладают отдельные программы. +Встроенные менеджеры паролей, например в браузерах и операционных системах, иногда не так хороши, как специализированные программы для управления паролями. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Например, менеджер паролей в Microsoft Edge вообще не поддерживает E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ schema: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Если вы хотите самостоятельно развернуть Bitwarden на своем сервере, скорее всего, вам стоит использовать Vaultwarden вместо официального сервера Bitwarden. -[:octicons-repo-16: Репозиторий Vaultwarden](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Поддержать } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Ваше хранилище 1Password защищено одновременно мастер-паролем и случайным 34-символьным ключом безопасности для шифрования данных на серверах. Этот ключ добавляет вашим данным дополнительную защиту: они зашифрованы с высокой энтропией независимо от безопасности вашего мастер-пароля. Многие другие решения для управления паролями полностью полагаются на безопасность мастер-пароля для защиты ваших данных. @@ -280,7 +280,7 @@ Traditionally, 1Password has offered the best password manager user experience f [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Должны использовать сильное, современное/стандартизированное E2EE. - Должны иметь тщательно документированные методы шифрования и обеспечения безопасности. -- Должен иметь опубликованный аудит от авторитетной, независимой третьей стороны. +- Must have a published audit from a reputable, independent third party. - Вся телеметрия, не критичная для работы сервиса, должна быть необязательной. - Не должны собирать больше ПД, чем необходимо для проведения оплаты. @@ -333,9 +333,9 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i -KeePassXC хранит экспортированные данные в виде [CSV](https://ru.wikipedia.org/wiki/CSV) файлов. При импортировании этого файла в другой менеджер паролей, вы можете потерять часть данных. Мы советуем вам проверять каждую запись вручную. +KeePassXC хранит экспортированные данные в виде [CSV](https://ru.wikipedia.org/wiki/CSV) файлов. You may encounter data loss if you import this file into another password manager. Мы советуем вам проверять каждую запись вручную. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC хранит экспортированные данные в виде **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC хранит экспортированные данные в виде [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC хранит экспортированные данные в виде -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Эта версия урезана, чтобы уменьшить площадь атаки. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Эта версия урезана, чтобы уменьшить площадь атаки. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Критерии **Обратите внимание, что у нас нет связей ни с одним из проектов, которые мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md)мы разработали четкий набор требований, позволяющий нам давать объективные рекомендации. Мы рекомендуем вам ознакомиться с этим списком, прежде чем выбрать программу, и провести самостоятельное исследование, чтобы убедиться, что это правильный выбор для вас. diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index d0645f70..d72f229a 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -84,7 +84,7 @@ If you want assistance figuring out the best privacy tools and alternative progr We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/sv/assets/img/ios/contact-permissions-dark.png b/i18n/sv/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/sv/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/sv/assets/img/ios/contact-permissions-light.png b/i18n/sv/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/sv/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/sv/assets/img/ios/photo-permissions-dark.png b/i18n/sv/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/sv/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/sv/assets/img/ios/photo-permissions-light.png b/i18n/sv/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/sv/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/sv/assets/img/ios/private-access-dark.png b/i18n/sv/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/sv/assets/img/ios/private-access-dark.png differ diff --git a/i18n/sv/assets/img/ios/private-access-light.png b/i18n/sv/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/sv/assets/img/ios/private-access-light.png differ diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index 6ebab1cf..6afbfa4c 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -233,7 +233,7 @@ I iOS är alla appar som kan surfa på webben [](https://developer.apple.com/app ![Safari-logotyp](assets/img/browsers/safari.svg){ align=right } -**Safari** är standardwebbläsaren i iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** är standardwebbläsaren i iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ I iOS är alla appar som kan surfa på webben [](https://developer.apple.com/app We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -Följande integritet- och säkerhetsrelaterade inställningar kan hittas under :gear:**Inställningar** → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiler -Alla webbplatskakor, historik och webbplats data kommer att vara separata för varje profil. Du borde använda olika profiler för olika ändamål, t.ex. Shopping, Arbete, eller Studier. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Integritet & Säkerhet -- [x] Aktivera **Förhindra spårning på andra webbplatser** +- [x] Enable **Prevent Cross-Site Tracking** - Detta aktiverar WebKits [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). Funktionen hjälper till att skydda mot oönskad spårning genom att använda maskininlärning på enheten för att stoppa spårare. ITP skyddar mot många vanliga hot, men blockerar inte alla spårningsvägar eftersom den är utformad för att inte störa användbarheten av webbplatser. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Aktivera **Kräv Face ID för att Låsa upp Privat Surfning** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - Den här inställningen låter dig låsa dina privata flikar med biometrik/PIN när de inte används. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Avancerat → Sekretess +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Integritetsrapport - -Privacy Report ger en ögonblicksbild av de spårare som för närvarande förhindras från att profilera dig på den webbplats du besöker. Den kan också visa en veckorapport som visar vilka spårare som har blockerats över tid. - -Rapporten om sekretess är tillgänglig via menyn Sidinställningar. - -#### Sekretessbevarande annonsmätning +##### Sekretessbevarande annonsmätning - [ ] Inaktivera **Integritetsbevarande annonsmätning** @@ -285,23 +283,23 @@ Funktionen har i sig själv inga större problem med integriteten, så även om #### Alltid privat surfning -Öppna Safari och tryck på knappen Flikar längst ner till höger. Expandera sedan listan Flikgrupper. +Öppna Safari och tryck på knappen Flikar längst ner till höger. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Välj **Rensa uppgifter vid avslut** Safaris läge för privat surfning ger ytterligare skydd för privatlivet. Privat surfning använder en ny [tillfällig](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) -session för varje flik, vilket innebär att flikarna är isolerade från varandra. Det finns också andra mindre sekretessfördelar med privat surfning, till exempel att inte skicka en webbsidas adress till Apple när du använder Safaris översättningsfunktion. -Observera att privat surfning inte sparar cookies och webbplatsdata, så det är inte möjligt att vara inloggad på webbplatser. Detta kan vara en olägenhet. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Detta kan vara en olägenhet. #### iCloud-synkronisering Synkronisering av Safari-historik, flikgrupper, iCloud-flikar och sparade lösenord är E2EE. Bokmärken är [inte](https://support.apple.com/HT202303) förinställt krypterade. Apple kan dekryptera och komma åt dem, enligt deras [integritetspolicy](https://apple.com/legal/privacy/en-ww). -Du kan aktivera E2EE för Safaribokmärken och nedladdningar genom att aktivera [Avancerat dataskydd](https://support.apple.com/HT212520). Gå till ditt **Apple-ID-namn → iCloud → Avancerat dataskydd**. +Du kan aktivera E2EE för Safaribokmärken och nedladdningar genom att aktivera [Avancerat dataskydd](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Aktivera **Avancerat dataskydd** +- [x] Turn on **Advanced Data Protection** -Om du använder iCloud med avancerat dataskydd inaktiverat rekommenderar vi också att du kontrollerar att Safaris standardhämtningsplats är inställd på lokalt på din enhet. Detta alternativ finns i :gear: **Inställningar** → **Safari** → **Allmänt** → **Nedladdningar**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Kriterier diff --git a/i18n/sv/os/ios-overview.md b/i18n/sv/os/ios-overview.md index c3b3c292..2c5e6f95 100644 --- a/i18n/sv/os/ios-overview.md +++ b/i18n/sv/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Rekommenderad konfiguration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index 2830bf98..f3c1c69a 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Inbyggda lösenordshanterare i programvaror som webbläsare och operativsystem är ibland inte lika bra som en särskild programvara för lösenordshantering. Fördelen med en inbyggd lösenordshanterare är att den är väl integrerad med programvaran, men den kan ofta vara mycket enkel och saknar integritets- och säkerhetsfunktioner som fristående produkter har. +Inbyggda lösenordshanterare i programvaror som webbläsare och operativsystem är ibland inte lika bra som en särskild programvara för lösenordshantering. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Lösenordshanteraren i Microsoft Edge erbjuder till exempel inte alls E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Dessa lösenordshanterare synkroniserar dina lösenord till en molnserver så at [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Dessa lösenordshanterare synkroniserar dina lösenord till en molnserver så at - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. Om du vill vara värd för Bitwarden på din egen server, vill du nästan säkert använda Vaultwarden över Bitwardens officiella serverkod. -[:octicons-repo-16: Vaultwardens utvecklingskatalog](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ . ard-link title=Dokumentation} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ . ard-link title="Källkod" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Ditt 1Password-valv är skyddat med både ditt huvudlösenord och en slumpmässig 34-teckig säkerhetsnyckel för att kryptera dina data på deras servrar. Den här säkerhetsnyckeln ger dina data ett extra skydd eftersom dina data är säkrade med hög entropi oavsett huvudlösenordet. Många andra lösenordshanteringslösningar är helt beroende av styrkan i ditt huvudlösenord för att säkra dina data. @@ -280,7 +280,7 @@ Ditt 1Password-valv är skyddat med både ditt huvudlösenord och en slumpmässi [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Måste använda starka, standardbaserade/moderna E2EE. - Måste ha noggrant dokumenterade krypterings- och säkerhetsrutiner. -- Måste ha en publicerad revision från en välrenommerad, oberoende tredje part. +- Must have a published audit from a reputable, independent third party. - All icke nödvändig telemetri måste vara frivillig. - Får inte samla in mer PII än vad som är nödvändigt för fakturering. @@ -333,9 +333,9 @@ Med dessa alternativ kan du hantera en krypterad lösenordsdatabas lokalt. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ Med dessa alternativ kan du hantera en krypterad lösenordsdatabas lokalt. -KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) -filer. Detta kan innebära att du förlorar data om du importerar filen till en annan lösenordshanterare. Vi rekommenderar att du kontrollerar varje post manuellt. +KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) -filer. You may encounter data loss if you import this file into another password manager. Vi rekommenderar att du kontrollerar varje post manuellt. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Denna version är avskalad i ett försök att minska angreppsytan. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Denna version är avskalad i ett försök att minska angreppsytan. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Kriterier **Observera att vi inte är knutna till något av de projekt som vi rekommenderar.** Förutom [våra standardkriterier](about/criteria.md)har vi utvecklat en tydlig uppsättning krav som gör det möjligt för oss att ge objektiva rekommendationer. Vi föreslår att du bekantar dig med den här listan innan du väljer att använda ett projekt, och att du gör din egen forskning för att se till att det är rätt val för dig. diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index 9dfd62b3..8fe72435 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -84,7 +84,7 @@ Om du vill ha mer information om varje projekt, varför de valdes ut och ytterli We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/tr/assets/img/ios/contact-permissions-dark.png b/i18n/tr/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/tr/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/tr/assets/img/ios/contact-permissions-light.png b/i18n/tr/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/tr/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/tr/assets/img/ios/photo-permissions-dark.png b/i18n/tr/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/tr/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/tr/assets/img/ios/photo-permissions-light.png b/i18n/tr/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/tr/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/tr/assets/img/ios/private-access-dark.png b/i18n/tr/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/tr/assets/img/ios/private-access-dark.png differ diff --git a/i18n/tr/assets/img/ios/private-access-light.png b/i18n/tr/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/tr/assets/img/ios/private-access-light.png differ diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index 3cbb7f71..bacdb189 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Gizlilik & Güvenlik - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/tr/os/ios-overview.md b/i18n/tr/os/ios-overview.md index deba7cf8..395b26af 100644 --- a/i18n/tr/os/ios-overview.md +++ b/i18n/tr/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Önerilen Yapılandırma +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index 2b72cded..4d57d0e6 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Tarayıcılar ve işletim sistemleri gibi yazılımlardaki yerleşik parola yöneticileri bazen özel parola yöneticisi yazılımları kadar iyi olmayabilir. Yerleşik parola yöneticisinin avantajı uygulamayla iyi entagrasyona sahip olmasıdır, ancak bazen çok basit kaçıp bağımsız uygulamaların sahip olduğu gizlilik ve güvenlik özelliklerinden yoksun olabilir. +Tarayıcılar ve işletim sistemleri gibi yazılımlardaki yerleşik parola yöneticileri bazen özel parola yöneticisi yazılımları kadar iyi olmayabilir. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. Örneğin Microsoft Edge'in parola yöneticisi uçtan uca şifrelemeyi desteklemez. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ Bu parola yöneticileri, tüm cihazlarınızdan kolay erişim ve cihaz kaybına [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ Bu parola yöneticileri, tüm cihazlarınızdan kolay erişim ve cihaz kaybına - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index 93c6b2b6..44cdaea5 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/uk/assets/img/ios/contact-permissions-dark.png b/i18n/uk/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/uk/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/uk/assets/img/ios/contact-permissions-light.png b/i18n/uk/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/uk/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/uk/assets/img/ios/photo-permissions-dark.png b/i18n/uk/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/uk/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/uk/assets/img/ios/photo-permissions-light.png b/i18n/uk/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/uk/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/uk/assets/img/ios/private-access-dark.png b/i18n/uk/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/uk/assets/img/ios/private-access-dark.png differ diff --git a/i18n/uk/assets/img/ios/private-access-light.png b/i18n/uk/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/uk/assets/img/ios/private-access-light.png differ diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index 3e3df029..8e8b2a5f 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/uk/os/ios-overview.md b/i18n/uk/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/uk/os/ios-overview.md +++ b/i18n/uk/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index 4824078a..2d1299da 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -145,7 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index a154c5aa..fc8f8416 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/vi/assets/img/ios/contact-permissions-dark.png b/i18n/vi/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/vi/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/vi/assets/img/ios/contact-permissions-light.png b/i18n/vi/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/vi/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/vi/assets/img/ios/photo-permissions-dark.png b/i18n/vi/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/vi/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/vi/assets/img/ios/photo-permissions-light.png b/i18n/vi/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/vi/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/vi/assets/img/ios/private-access-dark.png b/i18n/vi/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/vi/assets/img/ios/private-access-dark.png differ diff --git a/i18n/vi/assets/img/ios/private-access-light.png b/i18n/vi/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/vi/assets/img/ios/private-access-light.png differ diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index 5cb2df6c..4e845637 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### Privacy & Security - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Framadate diff --git a/i18n/vi/os/ios-overview.md b/i18n/vi/os/ios-overview.md index 0100a6f3..db5f534d 100644 --- a/i18n/vi/os/ios-overview.md +++ b/i18n/vi/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## Recommended Configuration +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index 1b1b09e3..0751284e 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -145,9 +145,7 @@ schema:

Info

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. [Homepage](https://keepassxc.org){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://keepassxc.org/privacy){ .md-button } - -??? +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. tải xuống @@ -175,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -183,7 +181,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -204,9 +202,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -218,7 +216,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -252,11 +250,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -276,7 +274,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -290,7 +288,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -318,7 +316,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -343,9 +341,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -361,7 +359,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -372,9 +370,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -396,9 +394,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -409,7 +407,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -417,12 +415,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -436,7 +434,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Framadate **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 24d7b438..5c4000ea 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -84,7 +84,7 @@ For more details about each project, why they were chosen, and additional tips o We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/zh-Hant/assets/img/ios/contact-permissions-dark.png b/i18n/zh-Hant/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/zh-Hant/assets/img/ios/contact-permissions-light.png b/i18n/zh-Hant/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/zh-Hant/assets/img/ios/photo-permissions-dark.png b/i18n/zh-Hant/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/zh-Hant/assets/img/ios/photo-permissions-light.png b/i18n/zh-Hant/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/zh-Hant/assets/img/ios/private-access-dark.png b/i18n/zh-Hant/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/private-access-dark.png differ diff --git a/i18n/zh-Hant/assets/img/ios/private-access-light.png b/i18n/zh-Hant/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/zh-Hant/assets/img/ios/private-access-light.png differ diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index b73983c0..2bdbfa5b 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -233,7 +233,7 @@ Mull 隨附預設配置的隱私保護設定。 如果想在退出應用程式 ![Safari 標誌](assets/img/browsers/safari.svg){ align=right } -**Safari** 是 iOS 預設瀏覽器。 它包括 [隱私功能](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios),例如 [智慧型追蹤防護](https://webkit.org/blog/7675/intelligent-tracking-prevention)、隱私報告、隔離且短暫的私人瀏覽標籤、指紋保護 (透過向網站呈現簡化版的系統組態,讓更多裝置看起來完全相同) 以及指紋隨機化,並針對已付費訂閱 iCloud+ 的使用者提供 Private Relay。 它還允許您使用不同的設定檔來分開瀏覽,並使用您的生物特徵/PIN 鎖定隱私瀏覽。 +**Safari** 是 iOS 預設瀏覽器。 It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: 首頁](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="隱私權政策" } @@ -247,35 +247,33 @@ Mull 隨附預設配置的隱私保護設定。 如果想在退出應用程式 如果您想要在 Safari 中使用內容阻擋器,我們建議您安裝[AdGuard](browser-extensions.md#adguard)。 -可以在 :gear: **Settings** app → **Safari** 中找到以下與隱私/安全相關的選項。 +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### 主題類別 -您的所有 Cookie、歷史記錄和網站資料將會針對各個主題類別分開。 您應該為不同用途使用不同的主題類別,例如購物、工作或學校。 +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### 隱私 & 安全 -- [x] 啓用 **防止跨網站跟蹤** +- [x] Enable **Prevent Cross-Site Tracking** - 這將啟用 WebKit 的[智慧追蹤預防](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp)。 該功能利用裝置上的機器學習來阻止跟蹤器不必要的跟蹤。 智慧追蹤預防可保護您免於許多常見威脅,但它不能阻止所有追蹤途徑,因為它被設計為不會干擾網站的可用性。 +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] 啟用 **需要密碼來解鎖私密瀏覽** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - 此設定可在私密瀏覽分頁未使用時使用 生物辨識資訊/PIN 鎖定。 +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### 進階 → 隱私權 +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations **進階追蹤和指紋保護** 設定將隨機化某些值,可使網站更難以進行指紋辨識: - [x] 選擇 **所有瀏覽** 或 **私密瀏覽** -#### 隱私報告 - -隱私報告提供跨網站追蹤器的快照,瀏覽器如何防止追蹤器在您訪問的網站上分析您的狀況。 它還可以顯示每週報告,以顯示哪些追蹤器隨著時間的推移被封鎖。 - -隱私權報告可透過「頁面設定」選單存取。 - -#### 維護隱私權廣告測量 +##### 維護隱私權廣告測量 - [ ] 停用 **維護隱私權廣告測量** @@ -285,23 +283,23 @@ Mull 隨附預設配置的隱私保護設定。 如果想在退出應用程式 #### 總是保持私密瀏覽 -開啟 Safari ,然後點按右下角的「標籤」按鈕。 然後,展開分頁群組清單。 +開啟 Safari ,然後點按右下角的「標籤」按鈕。 Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] 選擇 **私密瀏覽** Safar i的私密瀏覽模式提供額外的隱私保護。 私密瀏覽為每個分頁使用新的[短暫](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral)工作階段,這意味著各個分頁之間是隔離的。 隱私瀏覽還有其他較小的隱私優勢,例如在使用 Safari 的翻譯功能時,不會將網頁地址傳送給 Apple。 -請注意,私密瀏覽不會保存 Cookies 和網站資料,因此無法保持登入狀態。 這可能會帶來不便。 +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. 這可能會帶來不便。 #### iCloud 同步 Safari 的歷史記錄、分頁群組、iCloud 分頁和已儲存密碼的同步都採用 E2EE 加密。 但預設情況下,書籤[並非如此](https://support.apple.com/HT202303)。 Apple 可以根據其[隱私權政策](https://apple.com/legal/privacy/en-ww)解密並存取它們。 -您可以為 Safari 書籤和下載啟用 E2EE ,只需啟用「[進階資料防護](https://support.apple.com/HT212520)」即可。 請前往您的 **Apple ID 名稱 → iCloud → 進階資料保護**。 +您可以為 Safari 書籤和下載啟用 E2EE ,只需啟用「[進階資料防護](https://support.apple.com/HT212520)」即可。 Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] 開啟 「**進階資料保護**」 +- [x] Turn on **Advanced Data Protection** -如果您在不開啟「進階資料保護」的情況下使用 iCloud ,我們亦建議您檢查,確保 Safari 預設下載位置已設定為裝置上的本機位置。 此選項可在 :gear: **設定** → **Safari** → **一般** → **下載**中找到。 +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## 標準 diff --git a/i18n/zh-Hant/os/ios-overview.md b/i18n/zh-Hant/os/ios-overview.md index 23a8a124..b4a52ab2 100644 --- a/i18n/zh-Hant/os/ios-overview.md +++ b/i18n/zh-Hant/os/ios-overview.md @@ -10,7 +10,7 @@ description: 蘋果公司使用 Unix 作業系統來開發macOS 支援自家的 iOS 設備因其強大的資料保護和對現代最佳作法的遵守而受到安全專家的讚揚。 然而,Apple 生態系統的限制性——尤其是移動設備——仍然在很多方面阻礙了隱私。 -我們認為,與任何製造商的庫存 Android 設備相比,iOS 為大多數人提供了水平之上的隱私和安全保護。 不過,如希望或需要完全獨立於 Apple 或 Google 雲端服務,您可以使用 GrapheneOS 等 [自訂 Android 作業系統](../android/distributions.md#aosp-derivatives) 來實現更高的隱私標準。 +我們認為,與任何製造商的庫存 Android 設備相比,iOS 為大多數人提供了水平之上的隱私和安全保護。 However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### 激活鎖 @@ -18,7 +18,7 @@ iOS 設備因其強大的資料保護和對現代最佳作法的遵守而受到 ### 強制的 App Store -iOS 上應用的唯一來源是 Apple App Store,需要 Apple ID 才能訪問。 這意味著 Apple 擁有您在設備上安裝的每個應用記錄,且如果向 App Store 提供付款方式,則可能會將該資訊與您的實際身份聯繫起來。 +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. 這意味著 Apple 擁有您在設備上安裝的每個應用記錄,且如果向 App Store 提供付款方式,則可能會將該資訊與您的實際身份聯繫起來。 ### 侵入式遙測 @@ -28,6 +28,8 @@ iOS 上應用的唯一來源是 Apple App Store,需要 Apple ID 才能訪問 ## 建議的設定 +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是其硬體或軟體。 當使用 iCloud 等 Apple 服務時,大部分資訊都存儲在他們的伺服器上以密鑰保護,且預設情況下 Apple 可以取用該密鑰。 您可以查看 [Apple 文檔](https://support.apple.com/HT202303),了解哪些服務是端到端加密的。 任何列為“傳輸中”或“伺服器上”的內容都意味著 Apple 可以在未經您許可下訪問存取該資料。 這種訪問級別偶爾會被執法部門濫用,儘管您的資料在設備上還是安全加密的狀態。當然,Apple 與任何其他公司一樣容易遭受資料洩露。 @@ -48,7 +50,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 #### 媒體 & 購買項目 -在「 **設定** 」應用程式的頂部,如果您已登入 Apple ID,便會看到您的姓名和個人資料相片。 選擇該項,然後選擇**媒體 & 購買** > **查看帳戶**。 +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] 關閉 **個人化推薦** @@ -61,7 +63,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 設備有連線且遠程使用“尋找 iPhone”來定位您的設備,則位置資料不是 E2EE。 您必須決定權衡是否值得激活防盜鎖。 -在「 **設定** 」應用程式的頂部,如果您已登入 Apple ID,便會看到您的姓名和個人資料相片。 選取這項然後再選 **尋找**。 此處您可以選擇是否啟用或禁用“查找設備”功能。 +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. 選取這項然後再選 **尋找**。 此處您可以選擇是否啟用或禁用“查找設備”功能。 ### 設定 @@ -73,9 +75,9 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 #### Wi-Fi -您可以啟用硬體位址隨機化功能,以保護您免受跨 Wi-Fi 網路的追蹤。 在您目前連線的網路上,按下 :material-information: 按鈕: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] 打開 **專用 Wi-Fi 地址** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** 您也可以選擇 **限制 IP 位址追蹤**。 這與 iCloud Private Relay 類似,但僅影響與“已知跟踪器”的連接。 因為它只影響與潛在惡意伺服器的連接,所以啟用此設置應該沒問題,但如果不希望*任何*流量通過 Apple 的伺服器路由,則可把它關掉。 @@ -85,11 +87,13 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 - [ ] 關閉 **藍牙** +Note that Bluetooth is automatically turned on after every system update. + #### 一般設定 -預設情況中,您的 iPhone 設備名稱將包含您的名字,所連接的網絡中的其它人都可以看到該名稱。 所以應該將其更改為更一般的名稱,例如“iPhone”。 選擇 **關於** > **名稱** ,然後輸入您喜歡的裝置名稱。 +預設情況中,您的 iPhone 設備名稱將包含您的名字,所連接的網絡中的其它人都可以看到該名稱。 所以應該將其更改為更一般的名稱,例如“iPhone”。 Select **About** → **Name** and enter the device name you prefer. -經常安裝 **軟體更新** 以獲得最新的安全修復非常重要。 您可以啟用 **自動更新** ,以保持手機最新,而無需不斷檢查更新。 選擇 **軟體更新** > **自動更新**: +經常安裝 **軟體更新** 以獲得最新的安全修復非常重要。 您可以啟用 **自動更新** ,以保持手機最新,而無需不斷檢查更新。 Select **Software Update** → **Automatic Updates**: - [x] 打開 **下載 iOS 更新** - [x] 打開 **安裝 iOS 更新** @@ -97,13 +101,13 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 **AirDrop** 可以輕鬆傳輸檔案,但它可能允許陌生人對您發送不想要的檔案。 -- [x] 選擇 **AirDrop** > **關閉接收** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** 可讓您將內容從 iPhone 無縫串流到電視; 然而,您可能並不會想要一直維持這樣。 選擇 **AirPlay & 關閉** > **自動串流 AirPlay 到 TVs**: +**AirPlay** 可讓您將內容從 iPhone 無縫串流到電視; 然而,您可能並不會想要一直維持這樣。 Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] 選擇 **絕不** 或 **詢問** -**背景 App 重新整理**可將應用程式在不使用時刷新其內容。 這可能會導致它們建立不必要的連接。 關閉此功能還可節省電池壽命,但可能會影響應用程式接收更新資訊的能力,特別是天氣和消息傳遞的應用。 +**背景 App 重新整理**可將應用程式在不使用時刷新其內容。 這可能會導致它們建立不必要的連接。 Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. 選擇 **背景 App 重新整理** 並切掉無需在背景下繼續刷新的應用。 若不想讓任何 apps 在背景刷新,可再次選擇 **背景 App 重新整理** 並將其 **關閉**。 @@ -117,19 +121,19 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 在手機上設置強密碼是確保設備物理安全的最重要步驟。 您必須權衡安全性與便利性:每次輸入較長的密碼很麻煩,但較短的密碼或 PIN 碼很容易被猜到。 設置 Face ID 或 Touch ID 以及強密碼可以在可用性和安全性之間實現良好折衷。 -選擇 **開啟密碼** 或 **更改密碼** > **密碼選項** > **自訂英數密碼**。 確認建立[安全密碼](../basics/passwords-overview.md)。 +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. 確認建立[安全密碼](../basics/passwords-overview.md)。 如果想使用 Face ID 或 Touch ID,可以立即進行設置。 您的手機將使用之前設置的密碼作為後備密碼,以防生物識別驗證失敗。 生物識別解鎖方法主要是便利,雖然它們確實可以阻止監控攝像頭或身旁的人看到您所輸入的密碼。 如果使用生物識別技術,應該知道如何在緊急情況下快速關閉它們。 按住側面按鈕或電源按鈕以及*任一*音量按鈕,直到看到滑動關閉滑塊為止,這將禁用生物識別功能,需要密碼才能解鎖。 設備重新啟動後還需要您的密碼。 -在某些較舊的設備上,可能需要按電源按鈕五次才能禁用生物識別功能,或者具有 Touch ID 的設備,可能只需按住電源按鈕即可。 請事先嘗試此操作,以便知道哪種方法適用您的設備。 +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. 請事先嘗試此操作,以便知道哪種方法適用您的設備。 -**被盜設備保護**是iOS 17.3 的新功能,增加了額外的安全性,當設備在解鎖時被盜時保護您的個人資料。 如在 Apple ID 設定中使用生物辨識技術和「尋找我的裝置」功能,我們建議啟用此新保護: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] 選擇**開啟保護** -啟用被盜設備保護後,[某些操作](https://support.apple.com/HT212510)將需要生物識別身份驗證,無需密碼回退(如果駭客准竊盜已獲得您的 PIN),例如使用密碼自動填寫功能就可訪問支付資訊並關閉遺失模式。 它還可以在住處或其他「熟悉位置」以外的地點執行的某些操作增加安全延遲,例如需要 1 小時計時器來重設 Apple ID 密碼或退出 Apple ID。 此延遲是為了有時間啟用遺失模式並在小偷重置設備前保護好您的帳戶。 +啟用被盜設備保護後,[某些操作](https://support.apple.com/HT212510)將需要生物識別身份驗證,無需密碼回退(如果駭客准竊盜已獲得您的 PIN),例如使用密碼自動填寫功能就可訪問支付資訊並關閉遺失模式。 It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. 此延遲是為了有時間啟用遺失模式並在小偷重置設備前保護好您的帳戶。 **鎖定時允許存取** 提供您在手機鎖定時可以允許的選項。 禁用的這些選項越多,沒有密碼者可做的事情就越少,但對您來說也就更不方便。 選擇不希望其他人接觸您的手機後訪問其中哪些內容。 @@ -186,6 +190,8 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長 - [ ] 關閉 **改善 Fitness+** - [ ] 關閉 **改進安全性** - [ ] 關閉 **改進 Siri 與聽寫** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** 關閉 **個人化廣告** 如不願加入針對式行銷。 選擇 **Apple 廣告**: @@ -203,22 +209,57 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長 ### E2EE 通話 -通過電信運營商使用“電話”應用程式撥打的一般電話不是 E2EE。 FaceTime 的影像語音通話都是 E2EE,或是也可使用 [其他應用](../real-time-communication.md),例如 Signal。 +通過電信運營商使用“電話”應用程式撥打的一般電話不是 E2EE。 Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### 加密的 iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +如果您或您的訊息傳遞夥伴在沒有進階資料保護下啟用 iCloud 備份,則加密密鑰會存儲在 Apple 伺服器,這意味著他們可以訪問您的訊息。 Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### 塗黑臉孔/資訊 + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### 避免 iOS越獄 iPhone 越獄會破壞其安全性更容易受到攻擊。 運行不可信任的第三方軟體可能會導致設備感染惡意軟體。 -### 加密的 iMessage - -Messages 應用程式中訊息氣泡的顏色指示該訊息是否為 E2EE。 藍色氣泡表示您正將 iMessage 與 E2EE 結合使用,而綠色氣泡表示對方正在使用過時的 SMS 和 MMS 協議。 要在 Messages 中實現 E2EE ,目前唯一方法只有雙方都在 Apple 設備上使用 iMessage。 - -如果您或您的訊息傳遞夥伴在沒有進階資料保護下啟用 iCloud 備份,則加密密鑰會存儲在 Apple 伺服器,這意味著他們可以訪問您的訊息。 此外,iMessage 的密鑰交換不如 Signal(它允許您查看收件人密鑰並通過 QR 碼進行驗證)等替代方案安全,因此不應依賴它進行敏感內容通訊。 - -### 塗黑臉孔/資訊 - -如果想要隱藏照片資訊,可以使用 Apple 內置工具來完成。 打開要編輯的照片,按螢幕右上角的編輯,然後按右上角的標記符號。 按螢幕右下角的加號,然後按矩形圖標。 現在,可以在圖像的任何位置放置一個矩形。 確保按左下角的形狀圖標並選擇填充矩形。 **不要**使用亮光筆來混淆資訊,因為它的不透明度並非 100%。 - ### iOS Betas Apple 會為那些希望幫助查找和報告錯誤的人先提供 iOS 測試版。 不建議在手機上安裝測試版軟體。 Beta 版本不夠穩定,可能存在未被發現的安全漏洞。 @@ -227,4 +268,4 @@ Apple 會為那些希望幫助查找和報告錯誤的人先提供 iOS 測試版 ### Before First Unlock(初次解鎖之前) -如果您的威脅模式包含鑑識工具,而且您希望將利用漏洞存取手機的機會減到最低,您應該經常重新啟動裝置。 重啟後**解鎖設備**之前的狀態稱為“首次解鎖之前”(BFU) ,當設備處於該狀態時,取證鑑識工具[明顯更加困難](https://belkasoft.com/checkm8_glossary)利用漏洞訪問您的資料。 此 BFU 狀態允許您接收電話、簡訊和鬧鐘通知,但設備上的大部分資料為加密且無法訪問。 這可能不切實際,因此請考慮權衡這個作法對於自身情況是否有意義。 +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. 重啟後**解鎖設備**之前的狀態稱為“首次解鎖之前”(BFU) ,當設備處於該狀態時,取證鑑識工具[明顯更加困難](https://belkasoft.com/checkm8_glossary)利用漏洞訪問您的資料。 此 BFU 狀態允許您接收電話、簡訊和鬧鐘通知,但設備上的大部分資料為加密且無法訪問。 這可能不切實際,因此請考慮權衡這個作法對於自身情況是否有意義。 diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index b6519687..af86556f 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -145,7 +145,7 @@ schema:

資訊

-瀏覽器和作業系統所內置的密碼管理器常常不如專用密碼管理器軟體。 內建的密碼管理器優點是與原生軟體很好地整合,但它通常非常簡單,並且缺乏獨立產品具有的隱私和安全功能。 +瀏覽器和作業系統所內置的密碼管理器常常不如專用密碼管理器軟體。 The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. 例如,Microsoft Edge 的密碼管理器根本不提供 E2EE。 Google的密碼管理員有 [optional](https://support.google.com/accounts/answer/11350823) 個E2EE ,而 [Apple](https://support.apple.com/HT202303)預設提供E2EE。 @@ -163,17 +163,17 @@ schema: **Bitwarden** 是一個免費的開源密碼與密鑰管理器。 它旨在解決個人、團隊和商業組織的密碼管理問題。 Bitwarden 是最佳和最安全的解決方案之一,可存儲所有登錄名和密碼,同時方便地在所有設備之間保持同步。 -[:octicons-home-16: 首頁](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
-下載 +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden 伺服器端代碼是 [開源的](https://github.com/bitwarden/server) **Vaultwarden** 是 Bitwarden 同步伺服器的另一種實作,以 Rust 寫成,並與官方的 Bitwarden 用戶端相容。非常適合用來自架服務,因為使用資源吃重的官方服務可能不是很理想。 如果您想在自己的伺服器上自行託管 Bitwarden,幾乎可以肯定的是,您想使用 Vaultwarden 而不是 Bitwarden 的官方伺服器程式碼。 -[:octicons-repo-16: Vaultwarden 儲存庫](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="說明文件"} -[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="捐款" } +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -206,10 +206,10 @@ Bitwarden 伺服器端代碼是 [開源的](https://github.com/bitwarden/server) **Proton Pass** 是由 [Proton Mail] (email.md#protonmail) 背後的團隊 Proton 所開發的開放原始碼、端對端加密的密碼管理器。 它能安全地儲存您的登入憑證、產生獨特的電子郵件別名,並支援和儲存密碼。 -[:octicons-home-16: 首頁](https://proton.me/pass){ .md-button .md-button--primary } -[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="隱私政策" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="說明文件"} -[:octicons-code-16:](https://github.com/protonpass){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } +[:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
下載 @@ -244,13 +244,13 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6
-![1Password 標誌](assets/img/password-management/1password.svg){ align=right } +![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** 是一個密碼管理器,非常注重安全性和易用性,允許您將密碼、密鑰、信用卡、軟體許可證和任何其他敏感資訊存儲在安全的數位保管庫。 您的保管庫託管在 1Password 伺服器,費用為 [每月收取](https://1password.com/sign-up/)。 1Password 定期 [接受審計](https://support.1password.com/security-assessments/) 並提供卓越的客戶支援。 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. 您的保管庫託管在 1Password 伺服器,費用為 [每月收取](https://1password.com/sign-up/)。 1Password 定期 [接受審計](https://support.1password.com/security-assessments/) 並提供卓越的客戶支援。 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 -[:octicons-home-16: 首頁](https://1password.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=說明文件} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
下載 @@ -270,7 +270,7 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6
-傳統上,1Password 為使用 macOS 和 iOS 的使用者提供了最佳的密碼管理器使用者體驗;然而,它現在已在所有平台上達成功能均等。 1Password 的用戶端擁有許多面向家庭和不熟悉技術人士的功能,例如直觀的 UI,方便使用和導覽,以及先進的功能。 值得注意的是,1Password 的幾乎所有功能都可在其原生行動或桌面用戶端中使用。 +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password 的用戶端擁有許多面向家庭和不熟悉技術人士的功能,例如直觀的 UI,方便使用和導覽,以及先進的功能。 值得注意的是,1Password 的幾乎所有功能都可在其原生行動或桌面用戶端中使用。 您的 1Password 儲存庫使用您的主密碼和隨機化的 34 個字元安全金鑰來保護,以加密您在其伺服器上的資料。 此安全金鑰為您的資料添加了一層保護,因為無論您的主密碼如何,資料都受到高熵保護。 許多其他密碼管理器解決方案完全依賴於您的主密碼的強度來保護您的數據。 @@ -284,10 +284,10 @@ Proton Pass 行動應用程式和瀏覽器擴充功能於 2023 年 5 月和 6 **Psono** 是來自德國的免費開源密碼管理器,專注於團隊的密碼管理。 Psono支援安全分享密碼、檔案、書籤和電子郵件。 所有機密都受到主密碼的保護。 -[:octicons-home-16: 首頁](https://psono.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="隱私政策" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title="說明文件"} -[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="原始碼" } +[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } +[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
下載 @@ -318,7 +318,7 @@ Psono 為其產品提供廣泛的說明文件。 Psono 的網路用戶端可以 - 必須使用強大的、基於標準的/現代的E2EE。 - 必須有徹底記錄的加密和安全實踐。 -- 必須公開由信譽良好、獨立的第三方進行的審計。 +- Must have a published audit from a reputable, independent third party. - 所有非必要的遙測都必須是可選的。 - 除了收費之必要外,不得收集過多個人識別資訊(PII)。 @@ -347,11 +347,11 @@ Psono 為其產品提供廣泛的說明文件。 Psono 的網路用戶端可以 **KeePassXC** 是 KeePassX 的社群分支,是 KeePass Password Safe 的原生跨平台移植,目標是以新功能和錯誤修正來擴充和改進它,以提供一個功能豐富、跨平台和現代化的開源密碼管理器。 -[:octicons-home-16: 首頁](https://keepassxc.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="原始碼" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=貢獻 } +[:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
下載 @@ -367,7 +367,7 @@ Psono 為其產品提供廣泛的說明文件。 Psono 的網路用戶端可以
-KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) 檔案。 如果您將此檔案匯入其他密碼管理器,可能會造成資料遺失。 我們建議您手動檢查每個記錄。 +KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) 檔案。 You may encounter data loss if you import this file into another password manager. 我們建議您手動檢查每個記錄。 @@ -379,10 +379,10 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- **KeePassDX** 是適用於 Android 的輕量級密碼管理器;可在單一檔案中以 KeePass 格式編輯加密資料,並能以安全的方式填寫表格。 應用程式的 [專業版](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) 可讓您解鎖外觀和非標準協定功能,但更重要的是,它有助於並鼓勵開發。 -[:octicons-home-16: 首頁](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="原始碼" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=貢獻 } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
下載 @@ -402,11 +402,11 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- **Strongbox** 是 iOS 和 macOS 的原生密碼管理器。 Strongbox 支援 KeePass 和 Password Safe 兩種格式,可在非蘋果平台上與其他密碼管理器 (如 KeePassXC)搭配使用。 透過採用 [基礎免費模式](https://strongboxsafe.com/pricing),Strongbox 在基礎免費層級下提供大部分功能,而更多以便利為導向的 [功能](https://strongboxsafe.com/comparison),例如生物辨識驗證,則鎖定在訂閱或永久授權。 -[:octicons-home-16: 首頁](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="隱私權政策" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=貢獻 } +[:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
下載 @@ -417,7 +417,7 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- -此外,還提供離線版本:[Strongbox Zero](https://apps.apple.com/app/id1581589638)。 此版本經過刪減,試圖減少攻擊面。 +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). 此版本經過刪減,試圖減少攻擊面。 @@ -427,12 +427,12 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- ![gopass 標誌](assets/img/password-management/gopass.svg){ align=right } -**gopass** 是用 Go 寫成的命令列極簡密碼管理器。 它可在腳本應用程式中使用,並可在所有主要的桌面和伺服器作業系統 (Linux、macOS、BSD、Windows) 上運作。 +**gopass** 是用 Go 寫成的命令列極簡密碼管理器。 It can be used within scripting applications and works on all major desktop and server operating systems. -[:octicons-home-16: 首頁](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=說明文件} -[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="原始碼" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=貢獻 } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
下載 @@ -446,7 +446,6 @@ KeePassXC 將其匯出資料儲存為 [CSV](https://en.wikipedia.org/wiki/Comma- - ### 標準 **請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用專案前先熟悉此清單,並自行進行研究,以確保它是適合您的選擇。 diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 545a7d22..e78e1c22 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -84,7 +84,7 @@ description: Privacy Guides 社群所推薦的隱私工具、服務、軟體及 我們推薦 **Safari** ,因為它具有 [防指紋](https://webkit.org/blog/15697/private-browsing-2-0/) 功能和預設的追蹤程式封鎖功能。 它還會在私密瀏覽模式中分隔您開啟分頁的 cookies,以防止在標籤頁之間進行追蹤。 - - [閱讀完整評論 :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios) diff --git a/i18n/zh/assets/img/ios/contact-permissions-dark.png b/i18n/zh/assets/img/ios/contact-permissions-dark.png new file mode 100644 index 00000000..f7279408 Binary files /dev/null and b/i18n/zh/assets/img/ios/contact-permissions-dark.png differ diff --git a/i18n/zh/assets/img/ios/contact-permissions-light.png b/i18n/zh/assets/img/ios/contact-permissions-light.png new file mode 100644 index 00000000..c49046ad Binary files /dev/null and b/i18n/zh/assets/img/ios/contact-permissions-light.png differ diff --git a/i18n/zh/assets/img/ios/photo-permissions-dark.png b/i18n/zh/assets/img/ios/photo-permissions-dark.png new file mode 100644 index 00000000..a5e11c54 Binary files /dev/null and b/i18n/zh/assets/img/ios/photo-permissions-dark.png differ diff --git a/i18n/zh/assets/img/ios/photo-permissions-light.png b/i18n/zh/assets/img/ios/photo-permissions-light.png new file mode 100644 index 00000000..80e46c45 Binary files /dev/null and b/i18n/zh/assets/img/ios/photo-permissions-light.png differ diff --git a/i18n/zh/assets/img/ios/private-access-dark.png b/i18n/zh/assets/img/ios/private-access-dark.png new file mode 100644 index 00000000..b7126d32 Binary files /dev/null and b/i18n/zh/assets/img/ios/private-access-dark.png differ diff --git a/i18n/zh/assets/img/ios/private-access-light.png b/i18n/zh/assets/img/ios/private-access-light.png new file mode 100644 index 00000000..9ba36f06 Binary files /dev/null and b/i18n/zh/assets/img/ios/private-access-light.png differ diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index b346a9b2..59f63689 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -233,7 +233,7 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical) as well as fingerprint randomization, and Private Relay for those with a paid iCloud+ subscription. It also allows you to separate your browsing with different profiles and lock private tabs with your biometrics/PIN. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription. [:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } [:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } @@ -247,35 +247,33 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. We would suggest installing [AdGuard](browser-extensions.md#adguard) if you want a content blocker in Safari. -The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari** +The following privacy/security-related options can be found in :gear: **Settings** → **Apps** → **Safari**. #### Profiles -All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. +Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School. #### 隐私与安全 - [x] Enable **Prevent Cross-Site Tracking** - This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. +This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability. -- [x] Enable **Require Face ID to Unlock Private Browsing** +- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing** - This setting allows you to lock your private tabs behind biometrics/PIN when not in use. +This setting allows you to lock your private tabs behind biometrics/PIN when not in use. -#### Advanced → Privacy +#### Other Privacy Settings + +These options can be found in :gear: **Settings** → **Apps** → **Safari** → **Advanced**. + +##### Fingerprinting Mitigations The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you: - [x] Select **All Browsing** or **Private Browsing** -#### Privacy Report - -Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. - -Privacy Report is accessible via the Page Settings menu. - -#### Privacy Preserving Ad Measurement +##### Privacy Preserving Ad Measurement - [ ] Disable **Privacy Preserving Ad Measurement** @@ -285,23 +283,23 @@ The feature has little privacy concerns on its own, so while you can choose to l #### Always-on Private Browsing -Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list. +Open Safari and tap the Tabs button, located in the bottom right. Then, expand the :material-format-list-bulleted: Tab Groups list. - [x] Select **Private** Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new [ephemeral](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature. -Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience. +Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. This may be an inconvenience. #### iCloud Sync Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings** → **iCloud** → **Advanced Data Protection**. -- [x] Turn On **Advanced Data Protection** +- [x] Turn on **Advanced Data Protection** -If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**. +If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings** → **Apps** → **Safari** → **General** → **Downloads**. ## Criteria diff --git a/i18n/zh/os/ios-overview.md b/i18n/zh/os/ios-overview.md index f8fd999f..fa8e4de4 100644 --- a/i18n/zh/os/ios-overview.md +++ b/i18n/zh/os/ios-overview.md @@ -10,7 +10,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. iOS devices are frequently praised by security experts for their robust data protection and adherence to modern best practices. However, the restrictiveness of Apple's ecosystem—particularly with their mobile devices—does still hamper privacy in a number of ways. -We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md#aosp-derivatives) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. +We generally consider iOS to provide better than average privacy and security protections for most people, compared to stock Android devices from any manufacturer. However, you can achieve even higher standards of privacy with a [custom Android operating system](../android/distributions.md) like GrapheneOS, if you want or need to be completely independent of Apple or Google's cloud services. ### Activation Lock @@ -18,7 +18,7 @@ All iOS devices must be checked against Apple's Activation Lock servers when the ### Mandatory App Store -The only source for apps on iOS is Apple's App Store, which requires an Apple ID to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. +The only source for apps on iOS is Apple's App Store, which requires an Apple Account to access. This means that Apple has a record of every app you install on your device, and can likely tie that information to your actual identity if you provide the App Store with a payment method. ### Invasive Telemetry @@ -28,6 +28,8 @@ More recently, Apple has been found to [transmit analytics even when analytics s ## 推荐配置 +**Note:** This guide assumes that you're running the latest version of iOS. + ### iCloud The majority of privacy and security concerns with Apple products are related to their cloud services, not their hardware or software. When you use Apple services like iCloud, most of your information is stored on their servers and secured with keys which Apple has access to by default. You can check [Apple's documentation](https://support.apple.com/HT202303) for information on which services are end-to-end encrypted. Anything listed as "in transit" or "on server" means it's possible for Apple to access that data without your permission. This level of access has occasionally been abused by law enforcement to get around the fact that your data is otherwise securely encrypted on your device, and of course Apple is vulnerable to data breaches like any other company. @@ -48,7 +50,7 @@ A paid **iCloud+** subscription (with any iCloud storage plan) comes with some p #### Media & Purchases -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Media & Purchases** > **View Account**. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Media & Purchases** → **View Account**. - [ ] Turn off **Personalized Recommendations** @@ -61,7 +63,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Your location data is not E2EE when your device is online and you use Find My iPhone remotely to locate your device. You will have to make the decision whether these trade-offs are worth the anti-theft benefits of Activation Lock. -At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple ID. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. +At the top of the **Settings** app, you'll see your name and profile picture if you are signed in to an Apple Account. Select that, then select **Find My**. Here you can choose whether to enable or disable Find My location features. ### Settings @@ -73,9 +75,9 @@ Enabling **Airplane Mode** stops your phone from contacting cell towers. You wil #### Wi-Fi -You can enable hardware address randomization to protect you from tracking across Wi-Fi networks. On the network you are currently connected to, press the :material-information: button: +You can enable [hardware address randomization](https://support.apple.com/en-us/102509#triswitch) to protect you from tracking across Wi-Fi networks, and on the same network over time. On the network you are currently connected to, tap the :material-information: button: -- [x] Turn on **Private Wi-Fi Address** +- [x] Set **Private Wi-Fi Address** to **Fixed** or **Rotating** You also have the option to **Limit IP Address Tracking**. This is similar to iCloud Private Relay but only affects connections to "known trackers." Because it only affects connections to potentially malicious servers, this setting is probably fine to leave enabled, but if you don't want *any* traffic to be routed through Apple's servers, you should turn it off. @@ -85,11 +87,13 @@ You also have the option to **Limit IP Address Tracking**. This is similar to iC - [ ] Turn off **Bluetooth** +Note that Bluetooth is automatically turned on after every system update. + #### General -Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** > **Name** and enter the device name you prefer. +Your iPhone's device name will by default contain your first name, and this will be visible to anyone on networks you connect to. You should change this to something more generic, like "iPhone." Select **About** → **Name** and enter the device name you prefer. -It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** > **Automatic Updates**: +It is important to install **Software Updates** frequently to get the latest security fixes. You can enable **Automatic Updates** to keep your phone up-to-date without needing to constantly check for updates. Select **Software Update** → **Automatic Updates**: - [x] Turn on **Download iOS Updates** - [x] Turn on **Install iOS Updates** @@ -97,13 +101,13 @@ It is important to install **Software Updates** frequently to get the latest sec **AirDrop** allows you to easily transfer files, but it can allow strangers to send you files you do not want. -- [x] Select **AirDrop** > **Receiving Off** +- [x] Select **AirDrop** → **Receiving Off** -**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Handoff** > **Automatically AirPlay to TVs**: +**AirPlay** lets you seamlessly stream content from your iPhone to a TV; however, you might not always want this. Select **AirPlay & Continuity** → **Automatically AirPlay**: - [x] Select **Never** or **Ask** -**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but it may affect an app's ability to receive updated information, particularly weather and messaging apps. +**Background App Refresh** allows your apps to refresh their content while you're not using them. This may cause them to make unwanted connections. Turning this off can also save battery life, but may affect an app's ability to receive updated information, particularly weather and messaging apps. Select **Background App Refresh** and switch off any apps you don't want to continue refreshing in the background. If you don't want any apps to refresh in the background, you can select **Background App Refresh** again and turn it **Off**. @@ -117,19 +121,19 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). +Select **Turn Passcode On** or **Change Passcode** → **Passcode Options** → **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. If you use biometrics, you should know how to turn them off quickly in an emergency. Holding down the side or power button and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will also be required after device restarts. -On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. +On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance so you know which method works for your device. -**Stolen Device Protection** is a new feature in iOS 17.3 which adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple ID settings, we recommend enabling this new protection: +**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection: - [x] Select **Turn On Protection** -After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling Stolen Device Protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling Lost Mode. It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -186,6 +190,8 @@ You should disable analytics if you don't wish to send Apple usage data. Select - [ ] Turn off **Improve Fitness+** - [ ] Turn off **Improve Safety** - [ ] Turn off **Improve Siri & Dictation** +- [ ] Turn off **Improve Assistive Voice Features** +- [ ] Turn off **Improve AR Location Accuracy** Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Advertising**: @@ -203,22 +209,57 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve ### E2EE Calls -Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE, or you can use [another app](../real-time-communication.md) like Signal. +Normal phone calls made with the Phone app through your carrier are not E2EE. Both FaceTime Video and FaceTime Audio calls are E2EE. Alternatively, you can use [another app](../real-time-communication.md) like Signal for E2EE calls. + +### Encrypted iMessage + +The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices. + +If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. + +### Photo Permissions + +When an app prompts you for access to your device's photo library, iOS provides you with options to limit what an app can access. + +Rather than allow an app to access all the photos on your device, you can allow it to only access whichever photos you choose by tapping the "Select Photos..." option in the permission dialog. You can change photo access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Photos**. + +![Photo Permissions](../assets/img/ios/photo-permissions-light.png#only-light) ![Photo Permissions](../assets/img/ios/photo-permissions-dark.png#only-dark) + +**Add Photos Only** is a permission that only gives an app the ability to download photos to the photo library. Not all apps which request photo library access provide this option. + +![Private Access](../assets/img/ios/private-access-light.png#only-light) ![Private Access](../assets/img/ios/private-access-dark.png#only-dark) + +Some apps also support **Private Access**, which functions similarly to the **Limited Access** permission. However, photos shared to apps using Private Access include their location by default. We recommend unchecking this setting if you do not [remove photo metadata](../data-redaction.md) beforehand. + +### Contact Permissions + +Similarly, rather than allow an app to access all the contacts saved on your device, you can allow it to only access whichever contacts you choose. You can change contact access permissions at any time by navigating to **Settings** → **Privacy & Security** → **Contacts**. + +![Contact Permissions](../assets/img/ios/contact-permissions-light.png#only-light) ![Contact Permissions](../assets/img/ios/contact-permissions-dark.png#only-dark) + +### Require Biometrics and Hide Apps + +iOS offers the ability to lock most apps behind Touch ID/Face ID or your passcode, which can be useful for protecting sensitive content in apps which do not provide the option themselves. You can lock an app by long-pressing on it and selecting **Require Face ID/Touch ID**. Any app locked in this way requires biometric authentication whenever opening it or accessing its contents in other apps. Also, notification previews for locked apps will not be shown. + +In addition to locking apps behind biometrics, you can also hide apps so that they don't appear on the Home Screen, App Library, the app list in **Settings**, etc. While hiding apps may be useful in situations where you have to hand your unlocked phone to someone else, the concealment provided by the feature is not absolute, as a hidden app is still visible in some places such as the battery usage list. Moreover, one notable tradeoff of hiding an app is that you will not receive any of its notifications. + +You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability. + +### Blacking Out Faces/Information + +If you need to hide information in a photo, you can use Apple's built-in editing tools to do so. + +- Open the **Photos** app and tap the photo you have selected for redaction +- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right +- Select **Add Shape** and choose the square or circle +- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit. + +**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%. ### Avoid Jailbreaking Jailbreaking an iPhone undermines its security and makes you vulnerable. Running untrusted, third-party software could cause your device to be infected with malware. -### Encrypted iMessage - -The color of the message bubble in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using the outdated SMS and MMS protocols. Currently, the only way to get E2EE in Messages is for both parties to be using iMessage on Apple devices. - -If either you or your messaging partner have iCloud Backup enabled without Advanced Data Protection, the encryption key will be stored on Apple's servers, meaning they can access your messages. Additionally, iMessage's key exchange is not as secure as alternative implementations, like Signal (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications. - -### Blacking Out Faces/Information - -If you need to hide information in a photo, you can use Apple's built-in tools to do so. Open the photo you want to edit, press edit in the top right corner of the screen, then press the markup symbol at the top right. Press the plus at the bottom right of the screen, then press the rectangle icon. Now, you can place a rectangle anywhere on the image. Make sure to press the shape icon at the bottom left and select the filled-in rectangle. **Don't** use the highlighter to obfuscate information, because its opacity is not quite 100%. - ### iOS Betas Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. @@ -227,4 +268,4 @@ Apple always makes beta versions of iOS available early for those that wish to h ### Before First Unlock -If your threat model includes forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. +If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. The state *after* a reboot but *before* unlocking your device is referred to as "Before First Unlock" (BFU), and when your device is in that state it makes it [significantly more difficult](https://belkasoft.com/checkm8_glossary) for forensic tools to exploit vulnerabilities to access your data. This BFU state allows you to receive notifications for calls, texts, and alarms, but most of the data on your device is still encrypted and inaccessible. This can be impractical, so consider whether these trade-offs make sense for your situation. diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index f11e04b5..10fb972c 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -22,7 +22,7 @@ schema: - Windows 系统 - mac系统 - Linux系统 - - 安卓 + - Android - iOS subjectOf: "@context": http://schema.org @@ -40,7 +40,7 @@ schema: - Windows 系统 - mac系统 - Linux系统 - - 安卓 + - Android - iOS subjectOf: "@context": http://schema.org @@ -54,7 +54,7 @@ schema: url: https://proton.me/pass applicationCategory: 密码管理器 operatingSystem: - - 安卓 + - Android - iOS subjectOf: "@context": http://schema.org @@ -68,7 +68,7 @@ schema: url: https://psono.com applicationCategory: 密码管理器 operatingSystem: - - 安卓 + - Android - iOS subjectOf: "@context": http://schema.org @@ -97,7 +97,7 @@ schema: image: /assets/img/password-management/keepassdx.svg url: https://keepassdx.com applicationCategory: 密码管理器 - operatingSystem: 安卓 + operatingSystem: Android subjectOf: "@context": http://schema.org "@type": WebPage @@ -145,7 +145,7 @@ schema:

信息

-Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. +Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features that standalone offerings have. For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default. @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
@@ -173,7 +173,7 @@ These password managers sync your passwords to a cloud server for easy accessibi - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) - [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) -- [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) +- [:simple-github: GitHub](https://github.com/bitwarden/android/releases) - [:fontawesome-brands-windows: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/com.bitwarden.desktop) @@ -194,9 +194,9 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve **Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the resource-heavy official service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code. -[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation} +[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dani-garcia){ .card-link title="Contribute" } ### Proton Pass @@ -208,7 +208,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} +[:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
@@ -242,11 +242,11 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use that allows you to store passwords, passkeys, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). [:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation} +[:octicons-info-16:](https://support.1password.com){ .card-link title="Documentation" }
Downloads @@ -266,7 +266,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud
-Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. +Traditionally, 1Password has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature parity across all platforms. 1Password's clients boast many features geared towards families and less technical people, such as an intuitive UI for ease of use and navigation, as well as advanced functionality. Notably, nearly every feature of 1Password is available within its native mobile or desktop clients. Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. @@ -280,7 +280,7 @@ Your 1Password vault is secured with both your master password and a randomized [:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation} +[:octicons-info-16:](https://doc.psono.com){ .card-link title="Documentation" } [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
@@ -308,7 +308,7 @@ In April 2024, Psono added [support for passkeys](https://psono.com/blog/psono-i - Must utilize strong, standards-based/modern E2EE. - Must have thoroughly documented encryption and security practices. -- Must have a published audit from a reputable, independent third-party. +- Must have a published audit from a reputable, independent third party. - All non-essential telemetry must be optional. - Must not collect more PII than is necessary for billing purposes. @@ -333,9 +333,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title="Contribute" }
Downloads @@ -351,7 +351,7 @@ These options allow you to manage an encrypted password database locally. -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. You may encounter data loss if you import this file into another password manager. We advise you check each record manually. ### KeePassDX (Android) @@ -362,9 +362,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android; it allows for editing encrypted data in a single file in KeePass format and can fill in forms in a secure way. The [pro version](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) of the app allows you to unlock cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. [:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title="Contribute" }
Downloads @@ -386,9 +386,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title="Contribute" }
Downloads @@ -399,7 +399,7 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se -Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, Strongbox offers an offline-only version: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### gopass (CLI) @@ -407,12 +407,12 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ ![gopass logo](assets/img/password-management/gopass.svg){ align=right } -**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). +**gopass** is a minimal password manager for the command line written in Go. It can be used within scripting applications and works on all major desktop and server operating systems. [:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title="Contribute" }
Downloads @@ -426,7 +426,6 @@ Additionally, there is an offline-only version offered: [Strongbox Zero](https:/ - ### Criteria **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index 0883e062..f30faf30 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -84,7 +84,7 @@ If you want assistance figuring out the best privacy tools and alternative progr We recommend **Safari** due to its [anti-fingerprinting](https://webkit.org/blog/15697/private-browsing-2-0/) features and default tracker blocking. It also separates your cookies in private browsing mode to prevent tracking between tabs. - - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari) + - [Read Full Review :material-arrow-right-drop-circle:](mobile-browsers.md#safari-ios)